Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
575s -
max time network
589s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:53
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 wtfismyip.com 33 wtfismyip.com -
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 1420 msedge.exe 1420 msedge.exe 928 identity_helper.exe 928 identity_helper.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1196 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4928 1420 msedge.exe 83 PID 1420 wrote to memory of 4928 1420 msedge.exe 83 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 4112 1420 msedge.exe 84 PID 1420 wrote to memory of 2816 1420 msedge.exe 85 PID 1420 wrote to memory of 2816 1420 msedge.exe 85 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86 PID 1420 wrote to memory of 1276 1420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fbi.bet1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb7a46f8,0x7ffbcb7a4708,0x7ffbcb7a47182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17409406782100195580,700786931651818930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x3201⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50dc31145339977b457eec605c4e1a567
SHA1deb6ff8183afdaafd849858c821af52f93936e1c
SHA2564b1ef876e1d4f2c9726b7b966222c336d0be026c588178ad40ab476be4d353ec
SHA512ef095404247530ade966bae7d6920f0ff060852e3dfb545f4bbca384f88d0e2a4622b55e4b856ab63f6e6c56196a8ad1257711b53a2fcdd89962d1252b6c4e17
-
Filesize
152B
MD531f5155eeaa8631c1c80614efb4e73cd
SHA1aac054ba3a9bd71bb2644cc541aad11a5f119017
SHA2567e0833f04bdc7ed7a88940d793f110d199368d7c2ca55eabb154de84a355d7cf
SHA51294c43c4e59ae3745fee5157852c279110de2f89dd1562c47627ef960a70790db0b713155817ac7ac636e43f0218f73d35c915f9de61df019ba65c09730a21452
-
Filesize
1024KB
MD5214b2fa780663e5b1778c56a8c0c63fd
SHA12a82b012c67b9f595eb9d236514bdc5fd69f99e1
SHA256916ba93a76b04c7ba7dd845ba5df93b495016834581ea315af3b99207251cf47
SHA5126d1b74be3c6db291094fd464f4a6e9495e5d88eae0ab98cd94c27c2d201cc002c5dbac312157693ffb97504b14b1137f6faece68e5bce762a215d58466555ec7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD588752134281424dac8c3f9f0f7961fb1
SHA17027313f8cca33856980b97d156c56765b1e3264
SHA256ec39891a4cfc819356fc4bb529e1ccb60a435d813f71f6b57e733e11f9d52d0c
SHA512b0e3b4c51b55d4221ef21c2e73e6f29bc9ac88df6bd3a205ccdf1a12bdf82921e68035063ca0f2494e88c14a82534114e946dd5904ce88d1f4fbc4dc570b6462
-
Filesize
397B
MD5d9e666be39b1019a9b1b1983a8ccc53a
SHA15c129a5b0d7d6e01817f895d8a45f7184eb53708
SHA25692504a0034f144db378068f3aef2455cd47bec51ceb009ba46f5345e1d497c6f
SHA51222301b5a654735e39b2afc89912d8a38b71435f76ce3504ff68fc76fb026b40b603d506d770a792055d0dd7f125d93f3265023315ffeb184f60871c2bd7bb731
-
Filesize
6KB
MD5a98574afa99a6f0ad2f0d3141f2111e0
SHA15a6218e8da5381afdea5ed276f55d25aba610f8c
SHA2566da2abf80706d3157ccf71e18e0d77a533c81485a82bf292f0ff7fb642f42abf
SHA512cfb947f01707ecf9b2a8677612a6b6a5e0b1935cbd9512d0e7ced31aae4716b70bbf21b8addf79e1073dcad9fcc2128b92a1e635d174e3ff56a5d8f9dbb559a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b6603095-5dfe-45d7-9a81-09f5b510c090.tmp
Filesize6KB
MD5516a47c9e44229baac6574bf7e741abe
SHA1f222cc626e12ee5d6941894606428a9572fb2b2c
SHA256bf92ac355b17d78e9820f5c7c792fb37ca31ef1d4aaac8e36c63f110a7b85c1a
SHA5121060eb9af2f1f7ff24c5f5b058830c9b81645819ec051b6ce749af900f1d26a9298a5dee38a415aad4835119e3fe9113453199166e747c35fe32dcac87306a3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c6bd352d5b2bdf5ad03ee0851ba451dd
SHA16e865b2c51ce72df768a2eb07f3e97654ca2d11d
SHA2567ec9ca9410de2e51d1c082df031c0b859f7fd5442839d5aa19a780d10b947343
SHA512cfe560e01565636c35c4b526487384904bc1218ace42ad438f60c8ae88ce3260c5f784970e55029e907a5d555ee7e1ae77ee3394656c9186d74f641cea6cd522