Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 18:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kansas-quad-1.yunpan.de
Resource
win10v2004-20240709-en
General
-
Target
http://kansas-quad-1.yunpan.de
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 100 msedge.exe 100 msedge.exe 5060 msedge.exe 5060 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4580 5060 msedge.exe 86 PID 5060 wrote to memory of 4580 5060 msedge.exe 86 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 4220 5060 msedge.exe 87 PID 5060 wrote to memory of 100 5060 msedge.exe 88 PID 5060 wrote to memory of 100 5060 msedge.exe 88 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89 PID 5060 wrote to memory of 4240 5060 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kansas-quad-1.yunpan.de1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff9b00d46f8,0x7ff9b00d4708,0x7ff9b00d47182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1352 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6549527291829163467,2350467326881009642,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
5KB
MD51d8784cb9f36d397d76fad90d6dd4ce5
SHA1ace75d88340949024146789de64e01873d6e51de
SHA256f7e6c07d7a937d7e244724b01fb4e7fbf699e201c590cd3a14e362225ffdd88a
SHA512653cd52d22fde90a5ac0da0318022848d0b92a995f71b769739c7b22a65e291013b1746cbdea20949fb78992d96fe009fe258946a864332a0c1bcb73fe170d8e
-
Filesize
6KB
MD5350d02140f34010a15103ffe9c1c4359
SHA16464e21eca7646b4b34babff9392401b82f33d55
SHA25630879b0b0fbaa9f62cc5c10b7028c5e47b64754b4f6a255a7184065050ba5705
SHA512a2224200d10e28a404bb4f7e165dc2a3f38126afad06ae4f0dad2d5511a722d2ec2963fa5e92b67f54c7e7b33510a0358dabb6ac6cbf34c56c04a1aa8fd5b383
-
Filesize
6KB
MD5ad74a74a68ad604e5e10ab6d1163bef7
SHA1793990499c4ae72f5c0b76853397e47ff584ffdd
SHA2567826ec8478dfa473457bfbf0dbbd7e1b9a9952bde0dcf274b53edc49963ff333
SHA5122b8c978b9be8118d9514da5c5b5fc447828fa5781f7c039127c6948571bed156b6920936c95b620625d3591b7b1c4c255fda43422bda0a433d9b2675e2dce3e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca2f63d05157f53b40de86d55d1e463f
SHA1d60fad46681abe2ee5d55ec21a6697fe4deeca05
SHA256854af27682ac969830333d5296ccec17888d422932e1318d4be65643a75186bc
SHA512d01aab5618516f0bec562f91ffaf6866f9d38e8b1f1a7b5c89481c0e780ea4b3afa9d9f155bc1e54f925e38c25364332b65b263f143a9392faa5c5868686af08