Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 09:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunity.com/gift-card/pay/50
Resource
win10v2004-20240709-en
General
-
Target
http://steamcommunity.com/gift-card/pay/50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 4508 msedge.exe 4508 msedge.exe 1220 identity_helper.exe 1220 identity_helper.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 976 4508 msedge.exe 84 PID 4508 wrote to memory of 976 4508 msedge.exe 84 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 4700 4508 msedge.exe 85 PID 4508 wrote to memory of 1392 4508 msedge.exe 86 PID 4508 wrote to memory of 1392 4508 msedge.exe 86 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87 PID 4508 wrote to memory of 1400 4508 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://steamcommunity.com/gift-card/pay/501⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc72146f8,0x7ffcc7214708,0x7ffcc72147182⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3827610691749828052,2993614228239555493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5523284afd3622638e90357c5b2b0d71b
SHA17977caaa0bfa1885149ba319a3f172d6741df86f
SHA2563c8c1db4fcd17755392856308ab7c7a99a3f1b73dc7be60ba0b75d7a230162d5
SHA512b374081ebca46c770462d99f7c69b03614430bd87dd7946acb52b96952c656f67d3a42122564637823c6fc765633a9d0fa8e1af5864b5a6ab6e4073d106bcced
-
Filesize
641B
MD5e75a8bb14e96336a9b9448e83702004f
SHA1e51c9688757cccd57999b21a457a7dc4cda161aa
SHA256946bdf0c8c268b328640107eb38038ad8cc83c524ad1d07a2c7537f7b0453849
SHA51228d627a46b36f15a92d3547081170c2267c1eaed831520ddc0911ef66e916ff71ffa73f361bdf2260400831f428f832c41ce005563a737be1862ce6ee40b9b7f
-
Filesize
6KB
MD58787422a4abc13a0f8f724faf2ab80d0
SHA128072d0c24cf54ba7d223ef177511d6ed4af56f9
SHA2567a5d1cac79098e94f530a42856cc429a3eb70730df5b865da8933d7dfc73e067
SHA512adfdfd060948766efbd97cb3107cd8f63d2657f9ff65a3ac916cdac9703d1528411a0316e3825dd6c3c03e1e8e3cbc8fca78815b282f6ba2ba1a794857cff874
-
Filesize
5KB
MD5a0642544216e8dd0697ba7aba9b08206
SHA197b2aed168985d3d3acf606c4bd465660d5f8d80
SHA256c7bbec3fe89b9ef16248a106235c181c767e7497fc1349d33fdc95c6628dd8a6
SHA512eeb35f10503d97297aace8e849ae231f2afba8ddead100444e5ccefe5c9e39e99cbe94c7bc4aa21830979cee3e0e5e677f352effb4eaca3b7f72ec5d705d69bf
-
Filesize
6KB
MD5360272ae333acc4ff60a59284db222af
SHA1a58734776b731cee124a52a302630d5e44665ef9
SHA256323bbdf09b4d0678d8ab3e83794e7cedc7ecc04b06dc2bb4a6d636388ac42ad7
SHA512d82e6b69ad440b67e716d7e69c4dbde0031d8bbc9a91482a590f3fb45cde498bc730f69a3ef91834f1789d827403a31f3963bc0d2c47c43377515956d258ce77
-
Filesize
6KB
MD5b2b9e7ca74a478a40d1c25e881041f72
SHA11789a925cf4d3157b19cfd4e54cc8df6387494a1
SHA25675a2a389c7163718dd487746774f80fa32d65fbfee8a3d788d9692d08a63473c
SHA512651e97bb2fb8fb2fa19e6e873f6df6c18674f8bc65ac787247c47deb51921ba726219e5a5a611b2e2b700eaa923520c99b15a236b944e141bfe335361fc51731
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55730af127a31d680f1c856bc80139e3e
SHA152a33fc15783969accbebea53b46e7b3a07986f6
SHA2563edff4f3e701922efbeea6bee353e35dfd2597d858188df1525eb6a9d5f4b377
SHA5126c6a71c32e341280349876eabbeb68c35f5e172b6d789807f19235cbc81d6e67b58439ef6c1cfc9aeb13145234d6b6cb834acd2bfc218f745f1f667d384abbce
-
Filesize
11KB
MD54d56c288fd2a97692e458248571650fb
SHA128ac11c498c7717149972f98a6703beb15b27deb
SHA2564536bf6090e67423659b99b0ac9f400da5fdf1100ba36e05bc99c80fc7adb5c1
SHA512b1be42676646c2521df3df4e8c4606d3cd8ffb4a250da7fce38d4994fdba013cf19f38118b4baf1814410723640046394147344ce6e229a51d9a3f7537edb1c3