Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
ChmeLauncher.exe
Resource
win10v2004-20240709-en
General
-
Target
ChmeLauncher.exe
-
Size
244KB
-
MD5
287b88e8db9abc3a26e78b12b1ec8f40
-
SHA1
908d68a94626a0879e062cd44d900d9f1d945936
-
SHA256
9ac84a712ed812e0811a4cbb20ba970e0d26dce642818e285e12a4093fa3d1bc
-
SHA512
25af5881bda6975151e2567440573fb28a581a7027fc30d78d6671724dfd6928501d469ed8c0d0879298cafb4f00ef5d0e0534bf7918b86c25621fb05786cbec
-
SSDEEP
6144:05SQkxyAETAppFR6FOu8OqxmH/KJnIb9YxeqZvX:uyxyTAR0FN8OFfwIb9YxPX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 624 msedge.exe 624 msedge.exe 2864 msedge.exe 2864 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2864 3912 ChmeLauncher.exe 84 PID 3912 wrote to memory of 2864 3912 ChmeLauncher.exe 84 PID 2864 wrote to memory of 2396 2864 msedge.exe 85 PID 2864 wrote to memory of 2396 2864 msedge.exe 85 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 1424 2864 msedge.exe 86 PID 2864 wrote to memory of 624 2864 msedge.exe 87 PID 2864 wrote to memory of 624 2864 msedge.exe 87 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88 PID 2864 wrote to memory of 4020 2864 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChmeLauncher.exe"C:\Users\Admin\AppData\Local\Temp\ChmeLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://opensource.org/osd2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff268146f8,0x7fff26814708,0x7fff268147183⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:83⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:83⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:13⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:13⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:13⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4250670957538166694,4796010731750081225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5d01edb2157b7930068a494f944d72952
SHA1bca7605ee113ca168aa8aa4861f9eb063de140bb
SHA2561615351cdc9ff5d486c312005eac86c462bead6e75609429fcd30e54d2a907cb
SHA5121c354c83dadd47dbb2dbab08195b0a705002d7dcb85b0cb0d40edeb82c56b499c0fc9780749f0030577ff351928b0e2467eeafdc099362383ea96186fcb4428d
-
Filesize
403B
MD571a3537ef71298082203c2c7963b9853
SHA1c99b56afb65568bc47d8c6d3bdaf3bed32997180
SHA256a43bee81d901356d84ccea7f6327b7419885ccd104d77bcd52918a035c01c08b
SHA512b7ae148d47ad6c0f4f8470105706ae87e1fb14a3e2c3adc0661bf32556fa97cc0e5ba512062a7ed0764a5cac71d43d7715d7335099832abf13bca68a2fe1b418
-
Filesize
6KB
MD511acaf92f3eda8ae23cba37c064811db
SHA1fafd1c148b6e55ef213b942b7c1c4f07218cd75c
SHA256e36c738f14a6d3418c5183af7493b63ed1d185daab97b6d3043574e67f70f652
SHA5122751bd0a3c653296a23b9beea447ed11e6ddd64524e68827021478ea7a3c778873fbd2982ae072878f5349d28da8b2b17bb6d62ca4079520bd3612d3f6a503d2
-
Filesize
5KB
MD55e7bf980de81d51a4b82b58c3a120488
SHA1a08a33975e3944a741b618825b11e55d7faf2546
SHA256c295e37aa0a1aee206a72ac71f7a6905cfc4637a26093b80a8820470a31970eb
SHA512b4544dccd57e8762f6e224fdd8179b53b6e2c2d877b4246b76be6e5fa11fb1de8847ada53885d34ef3a46a5af08fb1b102ce158fba9d5cd57e8776be310f1fd9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cd239214263277bac4f6458fe2b8c781
SHA1281cad93938b30f9491f8f7608281c18a0028894
SHA256d0f39aa5c2daefe2c35905eb63362afbfb18e9690214c29e533ba6b9e329b52a
SHA5128a30fd78991192baea41f48cf003a9733369e8033a5f4418b018624148c3430d1bcb1d91b802ae8c980d53b1fbc9149d3df83df64a541985df21e2d84b6543c3