Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
cvery.com81642346624/Project1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cvery.com81642346624/Project1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cvery.com81642346624/sourcecodechina.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
cvery.com81642346624/sourcecodechina.url
Resource
win10v2004-20240802-en
General
-
Target
cvery.com81642346624/sourcecodechina.url
-
Size
76B
-
MD5
369535d8c9014d219600bf40cffb185b
-
SHA1
e3045ce09a778a6b7fa881670c575e94509695d6
-
SHA256
f47a9153a350c366edbed904a867429c78a95f8fb97c11c325d080e588215224
-
SHA512
976d347bd29279bd2233a9c4959b216e750b6d884ec2c7bb5512043d0be0abdf4649794328d33014be941b8b5594a10bbe9411695fd0a8b950c5d2cc6d72989c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2580 msedge.exe 2580 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2580 4064 rundll32.exe 86 PID 4064 wrote to memory of 2580 4064 rundll32.exe 86 PID 2580 wrote to memory of 4632 2580 msedge.exe 88 PID 2580 wrote to memory of 4632 2580 msedge.exe 88 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2452 2580 msedge.exe 90 PID 2580 wrote to memory of 2420 2580 msedge.exe 91 PID 2580 wrote to memory of 2420 2580 msedge.exe 91 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92 PID 2580 wrote to memory of 4360 2580 msedge.exe 92
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\cvery.com81642346624\sourcecodechina.url1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cn700.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff969c346f8,0x7ff969c34708,0x7ff969c347183⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:83⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:13⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:13⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:83⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:13⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:13⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:13⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:13⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5538378055552652457,9317380994239403926,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD513279880d445933013f62a5f1c806d8f
SHA1a9d354efc0081852f1313fe25dbc1825deeed016
SHA25697ee4b19408ea4aeca7bd1b98e7f1432f1ec0074c24e52870865304cc8acaa30
SHA5129cdbf39b6f1f74ed99510364f088552fb6d94b5ec6e59978e8f1a12f3698e72747d53fed88558a853357782191d9da342a50eb9ddab76f61a228cee18724cf3c
-
Filesize
6KB
MD5bbdbccde548d0ce41ac26a37f95ded42
SHA15e37f252c33d2346f1763eadd9f97edb933fb38b
SHA25686709558f42cc7303c1f921179916bf1b53ec02d3e44e7428a78b28e9768c602
SHA5125afe79599b6da8b25d744f0432e79ea6b5eb683419a1b41c9d870843d77901ee78c42f11924a6f9bfaf202be47f5b5cd664917ff206ea951f56228e2bdb50735
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e9e0df81fa6cefa8cb3ca94171661eef
SHA1788856ffbbf4ca66c29b2affea1230fa22e0e656
SHA256b51445d6a1747f829ee8b897ef8dc557d9e51993380d1521f2482ddf35d3a4ab
SHA5123da8d3622e0edac5d81c7aa9a1a0cacb262ef0cf302f44b22831b05083bc61d02e5fe7fad3fe73775ae505433004dfc6d9428a729b7e58eed1103bd48e326cf2