Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
486s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 12:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://graven.my.canva.site/
Resource
win10v2004-20240709-en
General
-
Target
https://graven.my.canva.site/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3536 msedge.exe 3536 msedge.exe 3028 identity_helper.exe 3028 identity_helper.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 1376 3536 msedge.exe 84 PID 3536 wrote to memory of 1376 3536 msedge.exe 84 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 1992 3536 msedge.exe 85 PID 3536 wrote to memory of 3708 3536 msedge.exe 86 PID 3536 wrote to memory of 3708 3536 msedge.exe 86 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87 PID 3536 wrote to memory of 4140 3536 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://graven.my.canva.site/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffb3c1246f8,0x7ffb3c124708,0x7ffb3c1247182⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11087008734702117238,5602913886716846155,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x4041⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\350c0746-fcc4-4032-895b-c7458e32e513.tmp
Filesize6KB
MD5823fbf7f6660d8833e6957f0d8eb2ed9
SHA1fd5c5f73cc5a64c16ad6b02c42410c170cbaf686
SHA2569667b4fa104665d67af85abb9dfb8ee0645901938381858a008e9ed727f3f632
SHA5120fcd37a4a8ef90f1a54b1a676cde8351776dbf109053068ce9d6a77d0cfe2bb15f75055013d30e15d3e8567cb9e380bca788796a69db564f157e1d4521fde8a1
-
Filesize
96B
MD515bf20be5333bdbde196ef8270bceffe
SHA1b50557760251c5183799559cdd670f855e735a16
SHA2562a27cc9b55f10a13254866de0e0ae9d95b02427418536a03bd6d8fe172cef6be
SHA512e1e5ad8630cc888a342a38f2bb82c14bc474075643d8ee69d18cb3b9e3e98a8c920cac8c2139721c093facb1fdff434f8e385aaf0043939ce72e762bbee05db2
-
Filesize
188B
MD50814f432da3ee58e1373cd67a093873d
SHA1db060647acea0099c135f94cbb3be2c19fa3a481
SHA25606ddd9721b6a941bfabc9d02171332325fd688bc238507592f9a52409e08558a
SHA51270ee57a076aa8878f623a52792f7ea99081aceaed54cad0af5a5ce395cf60e6b8b2e11924a9a410a382e905d09387b4afb2c708a996dae1ed44a0ce2eb659aa0
-
Filesize
5KB
MD53eb4e4b09671b2f4025b53eb380357d5
SHA1c753352d2a1155bfbe92d33b3251a1e65b4be4ba
SHA2564a5d81b2b3e28eebeac18db1efa9a3070cd9abc9f7e74a1282f92fa5977e67bf
SHA512a40479e032633c5c2b05e800a6ba6c4ae513a56ea1a0f94f17be2e0ef30396695a4fc305f504d7669905716e206deed0ea073ddac32cfe52ad690cdee79cb67a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a04aa53dfb54726e35d8dd12dbbce343
SHA19ea80323cbfea8029fd5b68f2e94493528e9a33a
SHA25643aa97ab9ea5b6a9cc1f982636a6e3f1f4380e72fbbd9fd2a2ac8db4869a1a6c
SHA512e46e77c885e370fc54734bbe3399124c3b27c1070ec0a2a6fa8ee940a231ee28b108f8509be675dc62ebcceb0eb597dfaa6b5da5b96626deb07792f0953aa99a