Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 21:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 3168 msedge.exe 3168 msedge.exe 2912 identity_helper.exe 2912 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 884 3168 msedge.exe 87 PID 3168 wrote to memory of 884 3168 msedge.exe 87 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 4248 3168 msedge.exe 88 PID 3168 wrote to memory of 2656 3168 msedge.exe 89 PID 3168 wrote to memory of 2656 3168 msedge.exe 89 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90 PID 3168 wrote to memory of 4812 3168 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,14547230697838009753,4608143446355945676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD55467945265d3bfc87c305b8e3bbd887d
SHA11cd551a285636a2e0ac064a6d36efb011cace272
SHA2569674263d7d0fe332df98add86a0175a971eda7ceec7a5403923fd942985ce292
SHA512a6878df5bfd785e357bb6260847d8e28ee12036379ed4cdc45133987c53f3f5719ec0206f8c12e5ce32f6d5775f935471fea0b35c1e50a193e37f11537184bb9
-
Filesize
496B
MD5f5efb2cf9219179700770c056a06e17b
SHA1f821ce0477c2d948f59e90d4e75db6900b1f5f23
SHA256159439d953aaa2a0e3226ddb534e5d7c96cf304d4b8e92e62e3c91354526ccdf
SHA512c8a717e42bd30e0fb9b2cdaca6142f7e048fb8133b0168d0f53748bb60cca6ed5ee6b1d26939f7206b033e307bc000e521a5e399aeee1017d8e5ea7856897a52
-
Filesize
5KB
MD5c85c7240f315b8696b1d9fdf2848046e
SHA1fb128fc1b71c99ee05ebfcea218d00df43944ab9
SHA25644ec252c483ac2072ff52042564e7352561f225cc28a4f0f9e83bd67f0105981
SHA512b356ff99762ce8233c778cb9092765af6d0c739e64fa26ac8cee289c8cf877b6be20d1be8f29d321716b50e5adaee82790b3c6efbfa3ce82191263e5f441ddfc
-
Filesize
5KB
MD5cf53a6275acf152f40a9a69ee4af0609
SHA101e5fc3bb15d342c76b889d31fad513bdcc84607
SHA256f8f4e2a328530fe4f5d61e9a65164a8860fb8e1bf1a9fb593765136270398580
SHA51232c866c0d0b4e8deee9daf14a0a49bc04a46774544864c530c917c45efaf669204df54b5ab054ac05bcc63b2558f761f94cf144cf64a82ba9e5d4caf7c3af6bf
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD544bac7ee0f9a27afcdcab1b4c9487bc8
SHA1c6b33871f2be635de5790caa12d7ac3564224bcf
SHA256cb83311703909830b0fb22a1c5e375d99e3227c3a85c0c32b02a49e6b57ca0e5
SHA512ad68341f675bc2804d4c7ce34796ea4f73238ca7223492e1c2a84652456fe22beb5f59cc9156c7504294bf53d5b2143a5fad48391d9ba3545b136a6b3f466b3f