Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
18s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/07/2024, 19:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://drive.google.com/file/d/1LQimdJ5-yHgc5QxkV40JWeofJ4Sfbww2/view
Resource
win11-20240709-en
General
-
Target
http://drive.google.com/file/d/1LQimdJ5-yHgc5QxkV40JWeofJ4Sfbww2/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 13 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3156 msedge.exe 3156 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4924 3156 msedge.exe 81 PID 3156 wrote to memory of 4924 3156 msedge.exe 81 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 800 3156 msedge.exe 82 PID 3156 wrote to memory of 3864 3156 msedge.exe 83 PID 3156 wrote to memory of 3864 3156 msedge.exe 83 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84 PID 3156 wrote to memory of 1472 3156 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://drive.google.com/file/d/1LQimdJ5-yHgc5QxkV40JWeofJ4Sfbww2/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe86f83cb8,0x7ffe86f83cc8,0x7ffe86f83cd82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,14534108422896352969,10175296094709257593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5caaeb604a99d78c4a41140a3082ca660
SHA16d9cd8a52c0f2cd9b48b00f612ec33cd7ca0aa97
SHA25675e15f595387aec18f164aa0d6573c1564aaa49074547a2d48a9908d22a3b5d6
SHA5121091aa1e8bf74ed74ad8eb8fa25c4e24b6cfd0496482e526ef915c5a7d431f05360b87d07c11b93eb9296fe386d71e99d214afce163c2d01505349c52f2d5d66
-
Filesize
152B
MD51fe10b6cb6b345a095320391bda78b22
SHA146c36ab1994b86094f34a0fbae3a3921d6690862
SHA25685a627e9b109e179c49cf52420ad533db38e75bc131714a25c1ae92dd1d05239
SHA5129f9d689662da014dfae3565806903de291c93b74d11b47a94e7e3846537e029e1b61ad2fad538b10344641003da4d7409c3dd834fed3a014c56328ae76983a2a
-
Filesize
5KB
MD517c2a8fcd648cb8eabdac8e7767e41b4
SHA19b58ffa603115d72c74d8d2591f6b11b8745b46e
SHA25616e0e4de7f7f36aea28a01863dfd6bffbc5905597a7e8dc8ba6b0bfce736f1b4
SHA512af1ebacbd5f129e868a0f96a0b3a70f361041d83ae54a08b048173c943830f2b2a52f05651fcc99efa01120d92d2438996d6e29079c8f05df7741c887ee5973b