Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 11:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://error-disne.com/home/src/1.php
Resource
win10v2004-20240802-en
General
-
Target
https://error-disne.com/home/src/1.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 2752 msedge.exe 2752 msedge.exe 4340 identity_helper.exe 4340 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2300 2752 msedge.exe 85 PID 2752 wrote to memory of 2300 2752 msedge.exe 85 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 4188 2752 msedge.exe 86 PID 2752 wrote to memory of 1420 2752 msedge.exe 87 PID 2752 wrote to memory of 1420 2752 msedge.exe 87 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88 PID 2752 wrote to memory of 5080 2752 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://error-disne.com/home/src/1.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,891530277061163722,18006366089165391273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD581adea48da9757e3321c1f8158eb9500
SHA110f6e310de923b64821d3ae0dbcfbbe8b7ed8d85
SHA2562d1d4b52bf9dcc8fdb0fe88c78ce933e9d9545ded65bd4fb49130dcd1de7c085
SHA512ce08c425dc62d11cb4beec283dce94ba50628f240f570d572afc76ba5d5dfed936fc03361b303c0b68619d6fb6dff57e838dc88fbb6e27381b29f834f5204bcc
-
Filesize
6KB
MD536d02d27f5b9d398505b44db4fa8672f
SHA1e492fa7c7c45d0280aa68e6733f82f21d120bf83
SHA2560fa9d5c5281c418011cbf162c619d0e2febde7243bc8c1d316d9124a4cfe3269
SHA5126b72f9e617274a437e4f379e03f917760eccdaf2c95711b8ee620d4b4a56baf6bc3a7241be94124b049124bf450c701f70fd4a7de4a3be4609ea71a2581fe3ac
-
Filesize
6KB
MD5ebd5bb0e5536cc8a70854ff228008f4f
SHA19a25e075377b9956c1783380d06d8136f174cebf
SHA25650b16800d70a5b655915017c3312c63c6135e8c47f7ae4fad3666719a49fed0d
SHA5126b59c4017028afc87aaa3383d61145e947b610bbceb8fd46e42c35344c0bf9ff471a802a7fac63a51e0c27bb91f8e23c35c93e67628db2c87bfa14b58adbe8d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD583b4aac6fe36fecc44d6055182e0c721
SHA10f0bd263c8fddd510987a91078b639a83705f5fa
SHA2567e22e7e61a9ec7e8557353cbba376683d18207ffc0850ae2a75417b72cb46614
SHA51288a7030620f90adc88713accdb9c5532976dfcde6af113d4fff52552c54b65c5022590fb0737ff2439893a71ce5aee748a8406d94db008a2f7d5845bff07c04b
-
Filesize
11KB
MD534daec519af21f34220b7678fbd2910d
SHA19e187d1b26ef054d5b9d2580c7f3c0ed7336462b
SHA256416f80ede37a9e53b321c151f9ba24d41b0aa129e449c35feb9682e2b24334eb
SHA5124ab3a374c96d53e3fcd5707244772c179cdf2429df7054fbe76b31f8b631911720bb945382cf28c8acd740e6ec2d6a1ef31a12efc6d401c7d103f387eca35474
-
Filesize
264KB
MD564c4a4de999ff64e82c7175c4dd1475c
SHA1af05d17f2a46476d6b6fc5382199c032a7cbb1dc
SHA256943396db4d3df0c26520c0f0e0a0161f9a7a6f3f144169076670b4f7fbcac33a
SHA5126f549cd9c3578bccbd000d2720cffd7ed74ee668d9246cf8420f97eb727d4d2d8a3fc5750fa09a8af02a04aca4be1f6d5194ab2d44becd42dbde2ed9bb994023