Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 06:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gmail.com
Resource
win10v2004-20240730-en
General
-
Target
http://gmail.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 2564 msedge.exe 2564 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1056 2564 msedge.exe 83 PID 2564 wrote to memory of 1056 2564 msedge.exe 83 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4068 2564 msedge.exe 84 PID 2564 wrote to memory of 4700 2564 msedge.exe 85 PID 2564 wrote to memory of 4700 2564 msedge.exe 85 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86 PID 2564 wrote to memory of 4336 2564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://gmail.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70ee46f8,0x7ffd70ee4708,0x7ffd70ee47182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13823505065245416781,6074253555787427613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516d2cc2d8a8347e405d36323b4e6ea99
SHA1ea695aa245d20b1e1141f4c18ee5e56f810614b4
SHA2565455c3741232efafea8e3b155a0fecb660800e2e0f19cd2d720281f7cdcbbc23
SHA51285d9d1319d4b4f8442e2fbd22951d7a2836f6456f18062508a5d22031d829a23a1a4453283f2194312ec444eef57fe09ca393c5c1536efabb7495fd301433343
-
Filesize
152B
MD5ee3b30a1359db628dcaf6b053a049740
SHA135bb7a4d99bce5d4ff9e080b6078dd8d9ca9cb1d
SHA2563d145dcba409bab26909c6090fe80bb55a0c030d226f26bb4e04b1bd495f5212
SHA5126825eef8c8fc940d1e21c31e8643f969386fc5c5f467b6ae4a6709dd09f35632bfa2b87f3bc828a8dc6d70533dc7fbfcef6772e2b73586286680f4b567d92c7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4adeadd5-fc8b-466d-82b5-33cc34fbdb2d.tmp
Filesize6KB
MD5b1828c3f98c15ab34e688a0b8cc9cef0
SHA1d0b6779775ed6d3e6bd1b83d350f11decc77c8ad
SHA256a72625d5a688a06e6923aa91a435e791b6992ad20c1da4c95a7376b04e8bb718
SHA51216fd1e734833c73a632ae0d0951ba664278c6900733bab366e0cf750f79f8f2bddbf6e38278cdff2d7df92d50d74b08406be8a24ccbef70a074d14e3fc62d0d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5985f5b13bdd49f135c13591de926c979
SHA1bca05b0044f1f13c57e5f4cebf52ddd4bee4eacf
SHA256f71ccc5110bb63434554df6b9fb84fdda110218b1a6ef52e86a34ae211544187
SHA51233fb652cfb4bbece0423b0b6296445f65b161dc4c7741e645ec70355b1452fd94ed5d044f2466856b08210e23f9b1d6bb247e020d6c44e8eb4507afa81679fbe
-
Filesize
1KB
MD52f488b992de033b6d3981ee699a02fa9
SHA1cc740bfd614bbea0fb614c00d1e3f89d64f24933
SHA2569e6c64ef3f1445d533b0db9c9b557fa55a11ee66e539e5535e80e7ee80e5f2ac
SHA5121c075bf67ec145df7f0d10bb86bbccf19339e3d7977d1fa9a246f5f24400bfc9d23e0f4fe6ac7c6c3a8aad5929a0340aa7fc53eb3145eb07bfe1c341c142de97
-
Filesize
1KB
MD537ffccb6cb6f2d9510065548639455cb
SHA18859c66d25636dc5707fb721d76982fba79eedf9
SHA25614d54625f15987f4ba77900635a256c9003511d00747df544535fa9fd43d0b8b
SHA512a6c5e0e642935d14fcee52f4194f5ea5d2c7d8d213d46ea3453dac870b447da0b4f87844f8bbf69bd2c2669576beed52e0ef175e31eb0ce87fcd4591dfc72e74
-
Filesize
6KB
MD54d2ef83096f36c1164ca2c645f655ad3
SHA17bd62f9de07cf1c36f9bd014e2e78a3d87d4603e
SHA256e5560225e10c3e23d257db2f414e64f2d08e41943cb9005a2b4d796258861302
SHA51220ad882531615317d9241bfbd0e97ee6f2677af67b302745c07a5c53e285db58caed644bcad7ffe256c86a554a9b558977ce60e2bde82dbc74a74b4cc4029c0b
-
Filesize
370B
MD545d1fea63a70a9fb5011959e39ac947a
SHA15323a3dec426ebfe0ea410757e8bb45dc424c36b
SHA256156b955b3d15bd146af5ae4c64307912102ca87bbdb8a513e604669a50e6cd2a
SHA5121bbea35c3fa518986ba05860af98dcbd54cb677f9b03047018fd9e8d99bdd13d41a7dc3f6d131a3f86cc500991b8753b4f899738537dcd16031aed14dc48ddd1
-
Filesize
370B
MD5347e43d975e7f91de267edfa9e698742
SHA1fca228f68f9772894e4a571a5dce086564f71376
SHA256dd29deccd8b1fc7adaa1cbd7dffadcc17eab963b04fc7de7532b46f1dd3d5726
SHA51254c7901aa50bdc6f1ab644c84cd0ce4b4ae193407e5701ce643be1913d9b1f5a15a21b3506c7988953dd650dc37d0d53a0b97bdcb0c6a9f2813d9745eef5a57a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59adee8eeb5b2b5ac7c86a86ff07a60fa
SHA138b5ef784e6ed8ddfe6665e413252578dea2d568
SHA25607b9fa0ea94a4208e2e26f6bdd7ca2d5ddb2040dee6ff7467559f7f99089e6a6
SHA51232db106c9a89289973ac1ab9857468bedecbb1458bb808d2144f2c0ad86a05b1c9034db7b9f3ccde01aff72610075816be7dd813a56bb9759aa93e9093821dea