Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/07/2024, 03:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ato.support/cc
Resource
win11-20240709-en
General
-
Target
https://ato.support/cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 4500 msedge.exe 4500 msedge.exe 392 msedge.exe 392 msedge.exe 3796 identity_helper.exe 3796 identity_helper.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2680 4500 msedge.exe 81 PID 4500 wrote to memory of 2680 4500 msedge.exe 81 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 3572 4500 msedge.exe 82 PID 4500 wrote to memory of 1448 4500 msedge.exe 83 PID 4500 wrote to memory of 1448 4500 msedge.exe 83 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84 PID 4500 wrote to memory of 2084 4500 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ato.support/cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbcac83cb8,0x7ffbcac83cc8,0x7ffbcac83cd82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,16873494656900540002,11471185899368933543,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD596a33da3b08a175c8b28ae075a96fa73
SHA10962ea0fcfe146fe5bd3631e00cddc6435f5cb99
SHA256a9ef78e6fa26e5517ba8417546298799871bf0ecc7a808af506ca0938edbc3ac
SHA51243b9ae37f34b3132ce8cdf4788cc13d49ac675be206f923f38adfcd86617f081ffe4189a8e9bf993fc9a39f22fa4db867287d14e3504288d78e860d8a6831a4c
-
Filesize
468B
MD58df6bbbddd50648a33196178c716fd0d
SHA12e868581e3206116fb537b8cbac2206947cd3767
SHA256cbb9b9ee1055d2e0c1a4be0cd032e4cc105dd54cd3df415e61696c8b3633cf51
SHA512743a3d05c2b9ed99604124a3b6190e254c5a0e7204de39890f9563889c8f53d8f7676d250335d57a22951281f34c6d906a823942ef1a4e3accaa52d01d1011f6
-
Filesize
5KB
MD514e7671b1741d4448a914345c1ea918a
SHA1226cd7780a0d0884b563ff2199504bbdacc14d7c
SHA256a8dbafa449e20fc2648ff733973aa010baad0a6cb7501bbc9fc37fd032a2a005
SHA5127950265be70a33bb9cfbc58c09b2c98fb9a1936ad1500c8a563903b1ba369dd37fffebb8e02aabef00c0b234af240ee50a2d8dfc55667ffe0c5c2758b17f7ede
-
Filesize
6KB
MD5fd35f670f4827bb93dff99cf799f46f9
SHA1cd098dfd94022a0de3cfd6fb4f8aca8d6b38d506
SHA25633b7cfe13f21c9817fc62b5c35b8e0922d05210eedef7eba30f9f987e1d2cf1b
SHA51254e23be1a06a9b0d0125a8a1d3ed98c69740821403fe8deda26a2ca7abc3eb38e0a4c616cfe3b59611602110417f1dce70aae0e6c92c1226dd790396abbecb0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b26517c0615334eb33741826bf62512
SHA1a145e5a55fe9c47d6e7e20c2389a332b91b626de
SHA256ba419645862397baefda92c29b63a77d6a351548b325b9418015f13958c8d5cb
SHA51265ebfa595efd7e5d85251e854b1bf1a85f4335428c1bbdc8f10b449de9ceab394c8c4d555e4b3ddc618d247caaf79230814842a15f5d8be46c2f9d548ba502df