Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1151s -
max time network
1154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/08/2024, 23:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/getfeather
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://bit.ly/getfeather
Resource
win11-20240802-en
General
-
Target
https://bit.ly/getfeather
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 3020 msedge.exe 3020 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3356 2408 msedge.exe 81 PID 2408 wrote to memory of 3356 2408 msedge.exe 81 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4788 2408 msedge.exe 83 PID 2408 wrote to memory of 4100 2408 msedge.exe 84 PID 2408 wrote to memory of 4100 2408 msedge.exe 84 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85 PID 2408 wrote to memory of 1992 2408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/getfeather1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff0db83cb8,0x7fff0db83cc8,0x7fff0db83cd82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,2266002091000319355,11356469628533668339,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59daa182cdc374df614e22b0479898300
SHA19cecb32ab2a704c39e50f5b2778b0ed1a533e925
SHA2566f28e7b4e9f5d7cd3ac32c05dc36bf9d4e2e91254994c72b124f77c0f8f65d42
SHA512da14dbde6ddbface80d8b2f98cd0d643e76dee4f6e1d78636c897d063c39fc252f4ca265d7a6f05110a4a452dca572ad0110f12e2bb883fce3e0bd02c06933de
-
Filesize
4KB
MD53163c319d74c35511e92769770766ae5
SHA1294d46feac26f3e7c59c3937da9c9ef9c9c020db
SHA25663d6a4433b792f27ad619daf014e130849412078b6cd412f50c1a706c434e8c8
SHA51244165bea30612639fe937c593d8c93e988c6d42ebf2345e24dcdd532ca8139cf372c763cc69147046fb960b6d9d5aa0b702ba01113d94a2f212855ae67ab8309
-
Filesize
4KB
MD57bdeb7077f10d35580f6ea7215cbec16
SHA10f825f1d4ca04dbae34d46129561c7e078cc540b
SHA25668b71155df4b865456af38b10baae511c36ee804f830b49343eb969d19e68bd2
SHA512d19ca9887c3e0070b3baac2024367feeed354bd1e2dfd3df25b974f07d0c93bee26e9970d10bcaa8f4c5c1d0a0de5b461fc4c428b7071bd5346cd150c082dc15
-
Filesize
5KB
MD54421568ec83fa05e2091e7fdb34f512a
SHA1379ffa9417484f65f576bd3fd897d4cd6ab77522
SHA25696a370eb784a6359a58234dbcf549ab017577456acd986e2120a2fe2f70c4330
SHA5120f1ea6a77547f5a53568b2166937cc375fc0a442ddbbe0a84d428a5d1dbc55241c9acac16d209a5f147dcaf066a62bf23f02af53a88db18e05e7c0ec08d3f5ed
-
Filesize
7KB
MD5010f25affc4e32774851ce8ca03faf40
SHA174e89047134348c0ca446d797b0f1074aaa05567
SHA256c7a90835926f9f22258d121128535c7524a9c9bf85242e15ea7d89f3dfe796a2
SHA5128be58af8761ddd2d67ab722523b0be858d0f02aeab29f5942a85407acd6f0afd156e09df22f4c5bb7ef6b2e70120aa3272d0b9cebe5d918e5bc9c78e3c734c80
-
Filesize
7KB
MD5cfaede1318b6795642ec74ad1ba0ea98
SHA1deb6bb5b52e8faaa1db1800207b0ab2739291e7a
SHA2561ed69c69d0309a413af7be3a7d58a2d6328f981f8ea1fdd2111d72b8407baa56
SHA512561376e2756682cfb92bd6cdb309c5e05f8f407298f0b525f450804e5c18893a829088abf0f8eac09afc489929d3ba82f4ca64674ab580d57d58a39e9677802a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53572ef4309c8d0797bb9353796d5ecda
SHA184e05fce6b766742e56ae706924afe2931a47c03
SHA25623966b8ff4a38497593aecca58f322d1d30de4b1a7dda52b439cc7a54cc130c8
SHA5124cd3e4ab4c03982c7dcc37643488e42451e9c3fad0a5864cc8f23e369513bbea04721fb474d21b87deddec83ee14bc96cb26a2d012c5e6ea895a2a40a93d80bd