Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
350s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 06:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://193.29.90.132
Resource
win10v2004-20240802-en
General
-
Target
http://193.29.90.132
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 4840 msedge.exe 4840 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3812 4840 msedge.exe 84 PID 4840 wrote to memory of 3812 4840 msedge.exe 84 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 2540 4840 msedge.exe 85 PID 4840 wrote to memory of 1196 4840 msedge.exe 86 PID 4840 wrote to memory of 1196 4840 msedge.exe 86 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87 PID 4840 wrote to memory of 3100 4840 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://193.29.90.1321⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974b546f8,0x7ff974b54708,0x7ff974b547182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3628 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5492316146272276880,16698840112785569372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4480
-
C:\Windows\System32\OpenSSH\ssh.exessh 193.29.90.1322⤵PID:3292
-
-
C:\Windows\System32\OpenSSH\ssh.exessh 193.29.90.132 -p 22212⤵PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD560b50053e8ae8aa1b9c5a22c384053e7
SHA1104664ff1c12e8275beb8c4eb5a96b92143f3e54
SHA256feb5a263bcc44b70be8790c067391256b5a20576fb4bb98e82dd3dda70543428
SHA512d4b00325bd48b0658b3b724af94f745ca1c00327978b525d2fbf5cafe9a61352884f42940c8bd9936a3fb8fdeb227a2bbe1d1fe3fc40a0b9bbfa71e4e90ad04c
-
Filesize
6KB
MD5614877060d5d38f07636dc7b50cbf627
SHA16472811d3ba469f8964993552ada408709b799b9
SHA25652c2c08e89312f141a0dd9ce27687a7c802a4beb51013c6cfa57bd9bc0bce5fa
SHA512402cfa3e245c5f330530cf071a2f7e45604788e60a7e6700e4d430fabc64d0e2a4cbfeea78e6ba1bbe3f29312898717cfed574c72bed63ee6dc6e450ca487cce
-
Filesize
6KB
MD5f7d86a369c8e9ccfd7d38f9cffe5f38c
SHA1dfee9dcef5bc653b36ff1f3f9672d119cda2ac48
SHA256fb7c7bd3f70bf5d8f72717121bbdfa46a0c2083892cf8d7218eed9a237245598
SHA512c58d8e578bead7eb1fed0aa4750b6425af1e2abdecfd7d246f771846e9ef545f452243821574876f1e3825c8927a5684ee63ec43f8711f9e2b75758a2ace5c8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b29450dc52d7a6a8ddf02f470255705b
SHA1c1cfccdedae5d4661060a6e8a83589d484020b55
SHA25687c65510cf8908dd51dbe69687d4e3cf0041a656c3f8a322c89c0eed8782c320
SHA51235e27590f68cccf2bba8142286b14a0e280c4f3e30af3ef06defdd785b98041d7a149811285ae5df5117fac38a846e4a87c6ea24fd179cc3ced49d73f55efd34
-
Filesize
11KB
MD5b00a060e9dce0ddf7d290f7ecf3036f2
SHA16976c3adefb824e975a88a8b8025ff64ebd85d45
SHA256e40e46372dee4d82b5055ca8d627ea3d7cd58ad39099aacda825676f2a94aa3c
SHA512357bb569d26b75bac9abc460585809a3a997fd9c33e808a921bac9690163ef2cf5c54b5cf9a14b4e59ddd51f63341b3a377038dc40395932dc15d4f52e9e9cae