Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/07/2024, 19:26
240720-x5mkesxgjk 920/07/2024, 19:25
240720-x5evksxfrr 120/07/2024, 19:25
240720-x43v1sxfrn 120/07/2024, 19:24
240720-x4pndswcrb 120/07/2024, 19:20
240720-x2kawsxfqn 8Analysis
-
max time kernel
1755s -
max time network
1761s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 19:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk
Resource
win10v2004-20240709-en
General
-
Target
https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3524 msedge.exe 3524 msedge.exe 2292 identity_helper.exe 2292 identity_helper.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4744 3524 msedge.exe 86 PID 3524 wrote to memory of 4744 3524 msedge.exe 86 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 820 3524 msedge.exe 87 PID 3524 wrote to memory of 3648 3524 msedge.exe 88 PID 3524 wrote to memory of 3648 3524 msedge.exe 88 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89 PID 3524 wrote to memory of 3340 3524 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc883446f8,0x7ffc88344708,0x7ffc883447182⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,5718471705395540040,11479313749258696797,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD501d8315e54bc9fb13a5ac003c409bf35
SHA1d1c4e2dc8914ce6a0ed53b00183fb298ecf9fd65
SHA2564fc6ebf6772dd49e8d8fb8f7c1d1efa21a39e3f87a2dd44507610348938a0795
SHA51226acd81ff5791c047e3e7ae6a5d314dbd753e7651576722d8273670b3df4cc335bcdd0ff2b45e8fd07ef826d2e73d9ffcf4bb8ee47d378c09010ee8ae3e1e8ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
5KB
MD5ddff6df3f26ba0d4858963f53a97d539
SHA1bba187b3ef23508c7d71168d199ecf2ca154d1d4
SHA256e32b69b9e104519ab2335ae2af1d42780b7b7ff1abc47f2cce7dc73a6bbb8e73
SHA51205a51230bf92b14ead0f3a61c656e361659353c61aed6c624e69a8bd87fe49bb2913c899332d4b59023f545725186b332d57e58d6aec52dfd8baaef19eadb110
-
Filesize
6KB
MD5150683d0cc7941bb587b9824eb8903ba
SHA10c6f59df4123736981df8ac6f6a9dc7925b79bfc
SHA256dc202f6a3ad13ec7510ce30e2bc2063e70368aaaf7e0070d908056800884c525
SHA5125c1d6e14f61b602d8a0765988dfea262f21d9a5f0b7f18ab987ee16b9d4d68d59eb3c58dea68c83b9609730135a96176858188f73271386a9de758ce8d5ccaf0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56033ab4ccc7414559e2e193b0e6db4a6
SHA1e47cb6ba1fb24dd7255d0f25d133593712ef68ac
SHA2568d848328596523ce8b0b23c1ffff6533d3fe71fd6282a2e09be521547689f9a1
SHA512b96a631f29a4cbfb2ae064d647ddb8e78d9d5868780b17e8f17b9305bb442af463d9e4044b9648899a08fb174946d2f55645c802fc8934837f266a1863a27222
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57df15.TMP
Filesize48B
MD5dc35acc16cc54e9069e0a18585f14a2d
SHA17e1116adf681d113f195336af7d9e30c418a87c4
SHA2564b80bfe94f8d66952472202157b64d75319834e1c476fe3c6dd49d6286b08f7f
SHA512644c0785873cb1268e0f8b3f031cb956c9d96cd62a9a4daec7565985d7ff2a99f776dc4fe41359e76105f823108f060471badc261d13015578c508cd2ba768aa
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fd5b2af220db3d786444f5f3b01bf8d6
SHA10c169f1683137f2fb4afea0713783d073162adb4
SHA256972cae852e8ef1b60678e089f9def483ec22de6ed66695f26febf5433f6948e5
SHA51255abfd714aab8a32b615f340949b0ec25fc19140b293506e3e24feaf18de35b8b79e32cc99e54fe9dda4987ac1dc81ba1d516584dc7414e96ed799a32320be6a