Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 14:22
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://schriftartit-my.sharepoint.com/:w:/g/personal/lisaspiss_schriftart_it/EY95Xdcw6HtJv68NeJDQKO0BOFucLl22Rj_oK4zMeLyQ-g?e=4%3a1PHaxB&at=9&xsdata=MDV8MDJ8TEJla2FpQGxvYWNrZXIuY29tfDJhM2ExOWVmZWFlZDQ2MWM1YTdmMDhkY2MyYjU4ZWMxfGE5ZDQ5YzZiMDNlZDQ2YjhhM2UzNThhZDA1MjRkZDI2fDB8MHw2Mzg1OTkzMzIyNDAzMDY5MDV8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjA9fDB8fHw%3d&sdata=VjZIWE1qRER3VkxZTkVORFFHZk1naHZBZUtNQU84ZlJqVG9RcW83bUQraz0%3d
Resource
win10v2004-20240802-en
General
-
Target
https://schriftartit-my.sharepoint.com/:w:/g/personal/lisaspiss_schriftart_it/EY95Xdcw6HtJv68NeJDQKO0BOFucLl22Rj_oK4zMeLyQ-g?e=4%3a1PHaxB&at=9&xsdata=MDV8MDJ8TEJla2FpQGxvYWNrZXIuY29tfDJhM2ExOWVmZWFlZDQ2MWM1YTdmMDhkY2MyYjU4ZWMxfGE5ZDQ5YzZiMDNlZDQ2YjhhM2UzNThhZDA1MjRkZDI2fDB8MHw2Mzg1OTkzMzIyNDAzMDY5MDV8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjA9fDB8fHw%3d&sdata=VjZIWE1qRER3VkxZTkVORFFHZk1naHZBZUtNQU84ZlJqVG9RcW83bUQraz0%3d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 668 msedge.exe 668 msedge.exe 640 msedge.exe 640 msedge.exe 1848 identity_helper.exe 1848 identity_helper.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 2484 640 msedge.exe 86 PID 640 wrote to memory of 2484 640 msedge.exe 86 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 1040 640 msedge.exe 87 PID 640 wrote to memory of 668 640 msedge.exe 88 PID 640 wrote to memory of 668 640 msedge.exe 88 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89 PID 640 wrote to memory of 3236 640 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://schriftartit-my.sharepoint.com/:w:/g/personal/lisaspiss_schriftart_it/EY95Xdcw6HtJv68NeJDQKO0BOFucLl22Rj_oK4zMeLyQ-g?e=4%3a1PHaxB&at=9&xsdata=MDV8MDJ8TEJla2FpQGxvYWNrZXIuY29tfDJhM2ExOWVmZWFlZDQ2MWM1YTdmMDhkY2MyYjU4ZWMxfGE5ZDQ5YzZiMDNlZDQ2YjhhM2UzNThhZDA1MjRkZDI2fDB8MHw2Mzg1OTkzMzIyNDAzMDY5MDV8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjA9fDB8fHw%3d&sdata=VjZIWE1qRER3VkxZTkVORFFHZk1naHZBZUtNQU84ZlJqVG9RcW83bUQraz0%3d1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b2d46f8,0x7ff82b2d4708,0x7ff82b2d47182⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,408569451149783995,14391036047235078971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5e38f068ec163a5eadd749657ebf9faca
SHA150b3fceb98fa8879963937088b44b12c4b0f2342
SHA256baa4f35abdac5d6031cf7ccc13d85069cc9e2d8d5cc365f1332b76c30caf3e73
SHA512f9e643a6d155aaa7f92623ecedcbc9f978c1d2a7cfe0965f6115a6a21e17f315abf2847caf0c4546bf5b2eaea798c86bafedd8607b77451b6b105fafdc231ba4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
364B
MD5442b90cfd4f7f189214c69bd9212152b
SHA1f0d306b5c377e38156debdcce91b34b2a303337f
SHA2564b1bfe562217b55b59bcb69c3018ab7e57972b8a2e2f1bed5fd1e4e4097e7a03
SHA512950e38efe9b8f5b4049e0b9e030bb9512f18aeb4d5ec3121ce8d40d0560ebf64cd57e0f8c3b323998562a8ce03ec464366bd7cb449101d3fbbb3780d0f0c0533
-
Filesize
5KB
MD51ff7fa9591031bb61e035447502738ca
SHA161566404b2453d6a44712cfffd988be2a4b96258
SHA25671b65295e089cc6d31e556d2169615489e3f088263103427075f570a0260f0b3
SHA51200731220168637e24b38af5d321b74e4906a2ae81a5a1777a1a409e843a3fe526fe511b43062eb5b5985f80284a3cc3d79adb3474ed7e29d90dfdd7c4af68b6d
-
Filesize
6KB
MD52a4ef91e4643e3ae4aaf099dbb09cf31
SHA104eb85c33aa216012e5dcfba2fefaac8d3fc4f8d
SHA256a21dbeb673749f2e738447a5e11c22198ba1e29b8eaa6a4c0fb31f44d17c21c1
SHA512faf2b8887148e51d5448bb12933ac0ddabb3ff7bac75bd589ee8e46a10df7607fbbb53010ba0737e47f22e7da1055f80e7a761c1fdd10e9c3a30638d7902f07b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dbf8d8b77f37e19b3d7880c880b75970
SHA107d4d39645b3f3df41c9a3c21a213056886da22e
SHA25648bc42aeb0624a7d3a8af9c89b4ba11bf93aa72b110e41ef96e99a322cb4198b
SHA51210a4c30c606ee9440a3395b54d9ad492817e4ed3957baeaaa24548d4d12c9206a907c8c94afaa0af55e2b027a07d7e84c06779cd9e5dcfbb56a0c284137c5376
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84