Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/01/2025, 01:33
250119-byqsls1lbs 319/01/2025, 01:06
250119-bf6q4szqcw 302/08/2024, 02:10
240802-clvrgavamg 316/07/2023, 03:36
230716-d6bd1add5z 5Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dirtyship.to/mr-sethi-nude-blowjob-tiktok-girl-video-leaked-19a-x/
Resource
win10v2004-20240730-en
General
-
Target
https://dirtyship.to/mr-sethi-nude-blowjob-tiktok-girl-video-leaked-19a-x/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3128 msedge.exe 3128 msedge.exe 4636 identity_helper.exe 4636 identity_helper.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1076 3128 msedge.exe 85 PID 3128 wrote to memory of 1076 3128 msedge.exe 85 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 916 3128 msedge.exe 86 PID 3128 wrote to memory of 3088 3128 msedge.exe 87 PID 3128 wrote to memory of 3088 3128 msedge.exe 87 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88 PID 3128 wrote to memory of 1944 3128 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dirtyship.to/mr-sethi-nude-blowjob-tiktok-girl-video-leaked-19a-x/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fad546f8,0x7ff8fad54708,0x7ff8fad547182⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,16225232003159031359,13389380098738215675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD594eddc8c760c6582645d582b4f107cca
SHA101860648fbebb62eadd53d3bc58471df3b8d211e
SHA256710d6dcbe48115aecea88b0a8c0124f5ae5f30225e59dde1bdfcc4574b5e5933
SHA5121cf9e561257755bbf563df4f348bba14ffbce2faa7cfb96738dd2aa4b166d1ddfee114578f8b84b4d7c59f3d18cadd9ebc5b45557116bf68c2eda0867d9e5484
-
Filesize
152B
MD571a22f9fe81453c6c788bfe09ab8fe0c
SHA1f4ee9368e5795c5b3f9470e0434358170e7646b6
SHA256ca6f5b89e7361282ace0d96bba28c2a4434ccecfd0a97d925e9bc61524efd908
SHA512a36d9a0c814d4293ae70a62a76e8a98e712ad91674a26cb3d8ffd300e22a6cba134e501b4a7e742229a66005db3b508aa821abcab1347b05457f06c712a1d724
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD5f828243133867f021b413119180e8bc5
SHA1e7ce62c86bc5b6f536049dca5089d16f207eeec9
SHA256f981a01f3832f6a077d02f2ffbe44a71b9ca04174873ec466410c475b3f3b400
SHA5128355003cd33c0f8b5806313eab6d422824f16e068991fecc1ba3badc1834bda593314c25deeb6d111d760ec8ff8b81f45b741859c792b4188434f7c7cd43d920
-
Filesize
2KB
MD557e0bb382be2b6fe9003bbd57c76c325
SHA1eeb4122bd2ef3fb6f90166cc2e301a7f7229de99
SHA256a26aa9507d09c1e29c6e4d4587e00cb1c17fc6642dac75cf4be819d53bce4362
SHA512dae92383e8eb6d1302454846e88dc627368b707ff38acb7bbf12b85ef8c33d3104a727333ddf10896764564fecabf25ea14f160c32c1d036c5d10fc803daebc6
-
Filesize
6KB
MD54a1096727144e070d00cc060d8ab0dd4
SHA19002faa82c5ce37e9d1072a5cc206aa0add3d68b
SHA2561d4bb1ad60da0cb0a540f1386b9bb5a7900bdf478067d6f6cb15ef4f91d5d79d
SHA51244a2a9c85a2f74a1db8dcafe55449ab02939e97d751156f62a0c38fe48da0b22df997ce73ebc4f10c00058965e76eb4358278ad484adc2347a8be76076cf165b
-
Filesize
7KB
MD5dfcbe4793012730a65837dd40759235b
SHA14f11533f86b5fd52e65a9b8e7156811400f49d17
SHA256cd723f4d4758e958ac39673173c5700aaba77fbef4b379fb6c28a1d585df9a35
SHA512752da81a8e375bf6a5815acfba28e6d28b3488c332115dd89f6311661721036a94481b26e4cc4e2828a3f30b392bb2e7d33ca4289d933acc6b706074fbfbbfde
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5520840ccfae2ee158f909e554f698932
SHA12ea0b6e5fc82d1d080c7a678d340bb82b432ec2d
SHA256c25fc09a6ef3a6485236e2206686561716b5d24d16072963f4e7d7b34bbd3fd2
SHA512ba47c7cd17a8f94b74610884390b53fe6fe1a9cbabacfbcaab873a626536b5343c0dc3b9235b8c4a109c8fd2b4241515cfadf7312060a557c73563e8d1dd2df9