Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 14:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://superuser.com/questions/1518290/how-to-know-the-device-type-using-mac-address
Resource
win10v2004-20240802-en
General
-
Target
https://superuser.com/questions/1518290/how-to-know-the-device-type-using-mac-address
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 3004 msedge.exe 3004 msedge.exe 1328 identity_helper.exe 1328 identity_helper.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3148 3004 msedge.exe 84 PID 3004 wrote to memory of 3148 3004 msedge.exe 84 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2848 3004 msedge.exe 85 PID 3004 wrote to memory of 2220 3004 msedge.exe 86 PID 3004 wrote to memory of 2220 3004 msedge.exe 86 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87 PID 3004 wrote to memory of 3660 3004 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://superuser.com/questions/1518290/how-to-know-the-device-type-using-mac-address1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9023646f8,0x7ff902364708,0x7ff9023647182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8894873450756694702,16165463239379683081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5064e3f43c78afb1a1ecb51598fda2694
SHA1ef5e568a866fbabeda896c9d44315c0f99c919bb
SHA256113f468fba8223f7999217c06050558b0e7ef5d5fbe67ad3a1ad7d5da450b763
SHA5126230ab5b61a044164e10df7fe04bfe5d6baede138255c8669d8aea25448fac4f2e95d315d5f25e0094217f953e1af781f8711ff42a8811324a94cfa1594294f9
-
Filesize
2KB
MD5fb2c8e29dbd02eff4a5fc7ac04174915
SHA1a0ff16bc3828a805cdbaac65b1d44cf23bbe2983
SHA256d92a82d2fc1756f19e1580eebc864dcf0716f7256b3384fa444392941ecd99e4
SHA512139c62329e6ce5d2764c694f216f391c56ffc796948a3f8568fedb82d9322549881be4e97a7f37ad6967c011f049cf8421d05dbc33cc90dd79a343dc1f5418ec
-
Filesize
6KB
MD5af57989b0e1e3c0c7552bf5ca2ce40d9
SHA143923932792c79cd0037233140a648aa59224ef3
SHA25644e521f21ecb405f2355eff26902da40b3b26d3ba8abbf491b9d75e9987e4941
SHA5125bf9585cb7224a670e4a301176477296c8260cd3de837f1e30a768c81b6fcd440e6bb130bad8d7604fb62437a2d466b972d5aba6cf8bf9d5de0e3f86d6165951
-
Filesize
7KB
MD5a502e04ba7804e1e9212cf515e997402
SHA148787af3d35bf80f909df608bf02af62c75a5f13
SHA2569c0351e3195fe772607866fb60245260ac66602b33948e15b1690420bc7ebc37
SHA512bb24a16fe7f9dfa877104ce9d285cf10408f54b3e054e1611c0fb6d4240f2bdefaf22be067d3425d68babaf2bac8bfd1f877eb8d678baf79f2a750c34cbc7d9e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD548012d3478e3e276323c05d3043b4f73
SHA199c0e699993ee809552b3203b799242bf3ffbd58
SHA25663763fb3577c11670f758b5640ab5836c03cfaf44331a2fed5af8aeed9bac52d
SHA5122d679d11346bcf71f1a22b6e0fcb82d77c54c22039b9b9a75215fa1944466fa1a720f9aa352d7b3f555d4cb07d5129533a1abf0e2ba1bfc31d78fa1928fb6f0b