Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 12:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pushpad.xyz
Resource
win10v2004-20240709-en
General
-
Target
http://pushpad.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 1864 msedge.exe 1864 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2396 1864 msedge.exe 84 PID 1864 wrote to memory of 2396 1864 msedge.exe 84 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 3808 1864 msedge.exe 85 PID 1864 wrote to memory of 2072 1864 msedge.exe 86 PID 1864 wrote to memory of 2072 1864 msedge.exe 86 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87 PID 1864 wrote to memory of 1772 1864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pushpad.xyz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd23bf46f8,0x7ffd23bf4708,0x7ffd23bf47182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17423173927983992941,14269843469335188473,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\11f3dfa9-b221-4837-9703-670ea3f01b51.tmp
Filesize590B
MD573ae6cfaadc76cbb3f13bdad19464348
SHA12b76d45fc8a2ed1c6a12651167e56c3adda37d61
SHA256f4dfa17217405fe518da430f50e99cf81a4c3a1744e2d1a0c62c2f67f0194797
SHA51256d07ae3e20a76ea889b9794064c1323bd963dcf1529ce88b189ecc25fe798c2910577055563a6b08826b1579ccdf604375b96221118c6476b7a9b3e0226c8c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55feeedc0673735558e6a572caaa352cb
SHA1d60873d841acbfab2935d131343320dc5abc5ff9
SHA2565e536209217625984b34b25e4dbe0e848e4adc181a484ac37f91d44b18bed122
SHA5122769c371e7d7e06f82592307a08cf675cc2cfd16acf5dedb16cbe7531888513f98622a4ad8d7b6b518b9c0ff9f48a33e1d783bce4785221b14fd8b014a6787e0
-
Filesize
6KB
MD54c084e9b6010e81a2fbd878ae383c084
SHA1ee45d404ef100910c66ea46a8d644ffb15a2a909
SHA2562d1dc558f522e9bc6af1dabbc3338f51139a10f102e4b4e1775b450de5b5b0af
SHA512b1401fcf377e900326b6e99694e203c00f10179e0c7276bdc92e93938d4de48f72bd94d22ff98f8991e5690253cefb7d523817c2e7226f3d77951f2f60353c6e
-
Filesize
6KB
MD5ba231f336de40ee3c243a54a59292278
SHA1999d9446cf9c1e19b29d4599b9a99daae6513a03
SHA2562254c98b3b21194b98fbb3b2c6a47a7a21f2d9c65fb090736986088057dba5e5
SHA5129f8fa6f4545cf9e1a50f18ad74360644a82a083146435604b83dc9a846a93b703de88ede114fd6accddcfb3f442522c7761560ad0952d28b82abf1535f694f76
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ff2432f9119d91ae375cf393d72c43ff
SHA1888eba25506b3449a7b9011546e3a3f69e825f92
SHA25689eb2259cebf40ae11952ca5a3bd5d56d044d6afcee468f9813ffd169c36365e
SHA512bc7d004eb7297f71ab0f2e671dad401bf197c0873365dd3373046f806446d057ee1e4f3f578c3a29f36046d8ae2fb822f0c9ca104abfcd8c858c8b0a476e7428
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe584ee6.TMP
Filesize48B
MD5590f202291181743f49a0ca90b9aa6b3
SHA1d58b776f7341123b208378430aac148fde93f69c
SHA2567ea815ff8eaf1ceffead14b389de28ac35028a3bf85c4a8bb3ec69feec78fc1c
SHA51258ae715475a9cbe2aabcde91999fcbb35a5ee739459d8220a2d1961d88e96b18c2b6b537bbe87be97d79ade0624672b762480f79371cdc4321f8f443c6af76c2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD515fd4538fa0268b368053630b60530d0
SHA179952c061017a948f57fbaa6b91411a1346bc680
SHA256e2212e4562862c85e82f60ac697e600271e559177fb2f5d5e33b1f939c7b5a46
SHA51254fd1e17c65c03f14bcd362e364a4da95d305ae52f4cd0b90cfef5bf8f24c3076cb13297fb4f58d185fbcc27050c98134daeb977270ef980e0a38004a88a0d5c