Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 05:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/spreadsheets/d/1gwC2BqLlhdr09Uvs9aUAGwp-p1bNuL9aoNf8mhkcptY/htmlview?pru=AAABkMjmmkM*ypBVGXLZJvZCDQqwACAdKQ
Resource
win10v2004-20240709-en
General
-
Target
https://docs.google.com/spreadsheets/d/1gwC2BqLlhdr09Uvs9aUAGwp-p1bNuL9aoNf8mhkcptY/htmlview?pru=AAABkMjmmkM*ypBVGXLZJvZCDQqwACAdKQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 4904 msedge.exe 4904 msedge.exe 2944 identity_helper.exe 2944 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1188 4904 msedge.exe 84 PID 4904 wrote to memory of 1188 4904 msedge.exe 84 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 3112 4904 msedge.exe 85 PID 4904 wrote to memory of 220 4904 msedge.exe 86 PID 4904 wrote to memory of 220 4904 msedge.exe 86 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87 PID 4904 wrote to memory of 3260 4904 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.google.com/spreadsheets/d/1gwC2BqLlhdr09Uvs9aUAGwp-p1bNuL9aoNf8mhkcptY/htmlview?pru=AAABkMjmmkM*ypBVGXLZJvZCDQqwACAdKQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff93ab46f8,0x7fff93ab4708,0x7fff93ab47182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1170337797454222166,10313337772897188318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
1KB
MD54d71c8b7f89870cfff250ed571cd7c00
SHA1544b0c7b5d0a241757784d31df6ad63df9cd3363
SHA2565f1cfae9de2299b169cd91f623c19cfb9cdbda05467dfdacc98ba02c7e456db4
SHA5128ae4145e5f88ae5502a94a5f889f20d378f76362ef902f84dd1f18aedd084397a082dc921b5638cc7be8990f1b76a4e3a78f9a371457a6ea4cfeadd1309f684c
-
Filesize
5KB
MD5f893228d276be8f35fdfcf50e34899ee
SHA18b1388a5ff7fce24100b1833b029c08ccd320b8d
SHA256446ea5438a39182a987efcabad963d86f58e6f60fbc6ced9507b0ac9f0863fb1
SHA512b5e01554a1666c135e7234185569c6f949959a195f514942f786f875006c482b5d1483247bd84db7f6fb00cea14c20b845e76e7ad9004128ae28a8f173098daa
-
Filesize
6KB
MD551ad7d7b0466b75840919f8263bb27bd
SHA1611600bb31fd97f5d8f3b675d8c66d4a41550e3a
SHA25649cc3030294a13899d5a305dfd28d0779957d483e384ee592f0b1e3c15550c5c
SHA51268205c2f98ed0799ea4c403720da81db38c7a33ea724848bec6a4f7ec318dafada078dc62256764ef201b421589095a6519153992a4f10d0bb5dd404323ae22a
-
Filesize
6KB
MD55a02266cfaa82c3ffd8ce820ea858ab8
SHA19d92af0eea6a3f2de888e38671e4ef3ba6406758
SHA256b06f65a3ab225c9522eb185b49c3ee6e8764ef51747fc7513f5c7e0b3ac74af1
SHA51257c4379cea2edce4840595457f850ad61c1d1c5f3623116568278c44e109e09249dc5d1635967693cdbce3fdfa9f5dd0e9e73ddf2fd4383cbbd26489baaf2a1d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f52b8e7d4e0b959f0ef911f675848969
SHA1c9440d640873b11f815c5ab2c6718852281b2970
SHA256e334b72da5c1d87a9130f00385bae1a9536ecd35c762b161a8d798542b049386
SHA51260cf2e7900e82d411e11b9431ee3de73833b44cf7dbdfc2bc092c5868b6db1cf8852e9fe7f5cca4d524c4c8aa85f260bc10a0d8ab2a98040cd6441b04418207a
-
Filesize
11KB
MD502d5e3bb9d1da8cfcd89659afe325faf
SHA1e5ac0c55e3bbc0cc2b5ca3aaf703ea4a4b20f08d
SHA256f48990bc3208d142876a9342586d0d603c9cdf0be2479fa3bc04e421fb87499d
SHA5120b8a4041c76de2b668c1522ae0faeb3b30fced7419059e9290d7891be600c989c421ef646369c31ba7f2b417359887e9251b7beda3fa1cd543a8087e11f05b9b