Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://photospace.life/P3Y1A5
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://photospace.life/P3Y1A5
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://photospace.life/P3Y1A5
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
https://photospace.life/P3Y1A5
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
https://photospace.life/P3Y1A5
Resource
win11-20240709-en
General
-
Target
https://photospace.life/P3Y1A5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 968 msedge.exe 968 msedge.exe 536 identity_helper.exe 536 identity_helper.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 4760 968 msedge.exe 84 PID 968 wrote to memory of 4760 968 msedge.exe 84 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5060 968 msedge.exe 86 PID 968 wrote to memory of 5024 968 msedge.exe 87 PID 968 wrote to memory of 5024 968 msedge.exe 87 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88 PID 968 wrote to memory of 2640 968 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://photospace.life/P3Y1A51⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81d2746f8,0x7ff81d274708,0x7ff81d2747182⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10335465452077444082,12455074447304170818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57d2c370bb27532f17fb5946fd94e5bde
SHA1f9020d970b3d5b299815249d58521fe20e24ee71
SHA256079cb26390a8dee673dfccc644e7efe3970d98f3bdb88d5961c880652919314f
SHA512a023a730627aa56dd14c5b9f345eeb35814c989a473339bd5401a4e25fd83cafd926db0ecaf00bc8d4fdef38cec4336717e5e7e7760d34600e2573c1f961de68
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
777B
MD5ac87aa591bca373e9c709d7ce2e93f8b
SHA11383d66bb8f704d7949c92f98bddd54197848a39
SHA256e438171b8cbf4366c767bde4740a6af30e287b660bfad06ec4eeed4dc67b4824
SHA512b2d5e452031a171936214a104f4ae68da30dcc308ba4bd25840be2e4f6fe4888490bce20aff75ac564c131ad5b3edd51b926bc8a72aa98c1d5e3dcc45a54da50
-
Filesize
6KB
MD591b7db337fa6be587abfb5e95efeb4a7
SHA1ad3064fc81aa44b04817438e7c5931dbff664983
SHA256050b332f0cb1bd28f40f0d45c32061cb0660894979b38fdf6c8a89889f7a644f
SHA512f2bcd5763e29fd7559d4252930a08aa5ad746d1f7d1a022b969ad06a6901037736f6adaaf2746f83edcae2f6f6ba2e0704b89fa83eedeb7f1f5724fcf9416a8b
-
Filesize
6KB
MD59de1bf34dcb134cb4c131216bbc7dfc0
SHA1f440322c6b65244893eb5a27f1c37cd2698d3c52
SHA2563fd85b82a356d7cf3580e23d72bf911b7ae8f367db474799d7d82bad5a9c776c
SHA5124667b555fcf52df818deebd0c7983e503aa54d5ad298ba5c9933d0e6a2ecd47adc7e8e8ae4d20a0b3edc4811e47a2db5ea97810ff51330e5ea826cb6fdc21080
-
Filesize
6KB
MD5d6ec4e9cdeb2281a3be5afdf5aa6a600
SHA132acaa08fd8af520a7d553d06a9c527169f6afa3
SHA256c4a4f631dc4d6a0a6b0db66549d4cda63840169c7f614941408f38c1dd12a33d
SHA512c9a8d632de6aebc39af7b9a85172f6a2ebc310fa26cac2ce0d85b2b5fc1fc666e77e494633eb8801296885d31dd3eaa34267070343b8eaac06d8219e67d34b7c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e78daf536d307dea410f733953bed39c
SHA155db7dd5826c7231fe435f4dbdada477215bcd45
SHA2565b5a4d296f8a7809388454c12882d307051fd36c9517c749e752388dde0d764c
SHA5127e625c023b464b9e0f01cc7b2bbc7bcd74ed70ba80438d7760493df04e94a39d10a1446a7d0b6b66f39d35f2bd6b93977c1d2cf99d0ecd35b79c484ed2a3f7c6