Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 06:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://is.gd/bRlg6N?FmV=o6jT1NESpN0rTGu
Resource
win10v2004-20240709-en
General
-
Target
https://is.gd/bRlg6N?FmV=o6jT1NESpN0rTGu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1592 msedge.exe 1592 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2564 1592 msedge.exe 83 PID 1592 wrote to memory of 2564 1592 msedge.exe 83 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1796 1592 msedge.exe 84 PID 1592 wrote to memory of 1892 1592 msedge.exe 85 PID 1592 wrote to memory of 1892 1592 msedge.exe 85 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86 PID 1592 wrote to memory of 4960 1592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://is.gd/bRlg6N?FmV=o6jT1NESpN0rTGu1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fdcf46f8,0x7ff9fdcf4708,0x7ff9fdcf47182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15083911468669797486,4192524825385836286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD51281286f98dc45ac1aaacc50792586d3
SHA14de8d2f4945876249911c44e1c119cf93c4e3bf0
SHA256f5690de7b6164cc125d85e5d90e8754fd531bb015647fcbf6b3bfbd42673c384
SHA5122a6108e3f74d820d246d71a5581a9f4f7668242e15dbbe94a3e143af039815e5bc72b91ef31127ec2e81e544f03df16ed655a4622d6b2167d4234a58d6009188
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\150432d6-b1fd-4a54-a3b4-91b573f1c439.tmp
Filesize6KB
MD5f18356b98e9862d5d943b5914940514f
SHA1f2a51e7508e62b92d495a5241b398c3d68d5b42f
SHA2569c1290e1b9c8c59d0e87c39df4d71485b651c2e0c0bf2a69a86d13230c3c5bef
SHA5126e7af1a8fdc0eaa7dbd937b1ca20bdee814ef7708d70604a53627383ee848a71446921a920b030cd60ec398d07162da2216c27121217904f656dd11c843cd335
-
Filesize
173B
MD500ac8fd72421bcefb726b79479a26699
SHA1e49d9cf02e3e404ffea2393b284d3976ff3e2863
SHA2568274114255b53ff00015beb8863609e873291d55546f28db3bad62996fadfe80
SHA512f99fd3d4ce777a0b6271bd6bffb2c5c1bfeca975dbf35de46e096af25b0ea4ccffd6a859d817586ab2938834bcd57fefa1a8cde0a3db989f741e2de5e1e7d73f
-
Filesize
6KB
MD5b4f1e176b5567332a020cc460c4290d0
SHA1b47bd1ed4d583513a26a2eb9a4270bebc8c0573e
SHA2561aa80fb35c48020996ff6f111f387401850211f9e7886f7dd08441b85dcf6f70
SHA5121eb5e87cc3afc5c67c38d69b7ae40c775444029edad29d307ef5eeee440ff8810866e664fed224954ca4de12f9d111fd090db20ab8ecf999a597a1502126bf5f
-
Filesize
6KB
MD5f93cc794c0a42b5ea7f5e6e66fd76dff
SHA1b35cb464c2f8c66309d9c309b685a3904f7643a5
SHA2564751df84d4b067f8a662966e4d3943afbef43cf2736d163fcdb426d8723ebeea
SHA5123d0428c7958485e7f0fdf9117e16b7e13504a0e54f63732aa937eaa2aae8fc42c825a7b233db88a7939828de749a902552e575e1002d352a8eff7c49ce04837f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389