Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
270s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 20:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/feed?json
Resource
win10v2004-20240709-en
General
-
Target
https://www.hybrid-analysis.com/feed?json
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2924 msedge.exe 2924 msedge.exe 1972 identity_helper.exe 1972 identity_helper.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 364 2924 msedge.exe 85 PID 2924 wrote to memory of 364 2924 msedge.exe 85 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 1144 2924 msedge.exe 89 PID 2924 wrote to memory of 2944 2924 msedge.exe 90 PID 2924 wrote to memory of 2944 2924 msedge.exe 90 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91 PID 2924 wrote to memory of 3024 2924 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hybrid-analysis.com/feed?json1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff946d946f8,0x7ff946d94708,0x7ff946d947182⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11557211546537953777,16350216487489715095,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
191B
MD58e9788a644e235e1a76f40bc09a77667
SHA17d4d46972b3c3b4612bc8d04c52a3e11cc16dfdf
SHA25698c6978ad381f77905100ff332f77b917d10d0afc8dd968be83a695ecf2ccf45
SHA512a7584319177327b8a8b650be442697a2121328d56a0bf6a74b0751540dc80176d8d6bd2cbe380f89d345fe2e38e98dcb5195de480e106979ed19c94cf25269d0
-
Filesize
6KB
MD5dac876e9e768ec9b4c9f344bc666a447
SHA1162ce71d0239b6b2517c9ce0b462c23642327410
SHA256c5194b10706f898e9052123abc1bf6f28cfdbb557b04046c6808cc85df64e68c
SHA51225b07127d201f00a40ecb89fe965540d045339615b824fedd37795682959f136720d6b4f4729e60c735fd2f466b606cbc2a2637c7626a0a8ce7e1ff6face8dea
-
Filesize
5KB
MD511949f895c40619cfd18db018bf3f7fe
SHA162bc4232f31f3acacfd8d23e56cb0a1b674309cf
SHA256e26bfe4f34748653443ade5b6c1d2874a01006ccefcf9ea8c4eec813d479b28f
SHA5122625cefd0536089bad9134e790f1a1116ec989802f38b8966f35fe9c0747f1739b8af0da23b2004ced048b403f8ae6183c6d529f6cebc393b6c1611c8d4f5967
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5aa3a80609c0d8f486f8e6bf9dd3edf23
SHA107655e48c2423d2a4cc2e0af7fe96bfd28e0b7c7
SHA2569a79ec83304e3f93c5c4c518417c3ee24b48cec5a1c5d68a2505b53d8364792d
SHA5124097ac96ac9e6f303c00091cb4d7731d1f857f28a4f8c80ea6b7599fc59342c195cb0c839fe788df8e0149550d2dc263f79393f7b6fb0127e3c987bb0d67b376