Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 18:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ftp://ftp.gizemetiket.com.tr
Resource
win10v2004-20240802-en
General
-
Target
http://ftp://ftp.gizemetiket.com.tr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3940 2988 msedge.exe 82 PID 2988 wrote to memory of 3940 2988 msedge.exe 82 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 524 2988 msedge.exe 83 PID 2988 wrote to memory of 1988 2988 msedge.exe 84 PID 2988 wrote to memory of 1988 2988 msedge.exe 84 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85 PID 2988 wrote to memory of 2856 2988 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ftp://ftp.gizemetiket.com.tr1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff67ce46f8,0x7fff67ce4708,0x7fff67ce47182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9647596380396170462,13284924945168749067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5e0deed80210c8797f59790fe2d78af93
SHA13790f1125ccadd4c08ee737286f29ae7439ae43c
SHA256c75c4fe60313c5c781e5f819e4795d59b005b7934cfee73d5898b63492a9ba12
SHA512433960fab79f989da02d984a72d47f4f3356f549465782906d975c03f9180ac0aff63b33134d16269aa31c17d315932a2a2be432cafd812f79110bf2cb416539
-
Filesize
6KB
MD531895ae7d6ea3b3e0803e4b99a07154d
SHA18e6c0dc3408525884523699be22a4a35a469fda9
SHA256f71a5acdea8ea4a7c7f5c41329b7b23aa0d48986f3d3c010e99e2233795d422c
SHA51271d6539dc3be1ff6e080798c3949727a1095d99e58599f099eaa9ea942f05b5e29d3aa185d509a209b38deefbf6c0cd9cc46821fa916493ac14a4fe4af9c799b
-
Filesize
10KB
MD5d8606c82b6950c214c24e718735f715a
SHA18123400688041c010bb959cd6242e688cf4cda87
SHA25689d175dfff9f29067759168f51c2b2d9b550b64a8df0f962aecde9a1b547fb6a
SHA5129fbafe98248eb4a1119430e6facc4d53ed19456d5a100f2a4cee40bc50eacc9247cbe0993f5c971e36aaf9597de9508463757981362714e92de23a6e94f5813c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58