Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 15:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1155213379296821468/1276194557041704980/image.png?ex=66c8a44c&is=66c752cc&hm=683bdeb294585c3b9c77b479f88db9dc3c305a8cc4acfaa9b98fd43a6183439f&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1155213379296821468/1276194557041704980/image.png?ex=66c8a44c&is=66c752cc&hm=683bdeb294585c3b9c77b479f88db9dc3c305a8cc4acfaa9b98fd43a6183439f&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 8 msedge.exe 8 msedge.exe 4736 identity_helper.exe 4736 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 1156 8 msedge.exe 85 PID 8 wrote to memory of 1156 8 msedge.exe 85 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 2808 8 msedge.exe 86 PID 8 wrote to memory of 1288 8 msedge.exe 87 PID 8 wrote to memory of 1288 8 msedge.exe 87 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88 PID 8 wrote to memory of 3420 8 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1155213379296821468/1276194557041704980/image.png?ex=66c8a44c&is=66c752cc&hm=683bdeb294585c3b9c77b479f88db9dc3c305a8cc4acfaa9b98fd43a6183439f&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47182⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,46481573073099869,16996176331843419065,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
476B
MD5690e75e8e68c541f433a8601c12e9348
SHA1d08cf9c5d61afa101f6aadf85214bc6a7dc75589
SHA256e277622a28350fe4d5cc33ff4b53cd1c94d154717ceed609c7c678808da561d0
SHA51244fde1320ac57c7e7d1817fb4227c8e97103f3d662b8d6aba12573da38c43cda0f6e67fd13ab842a02d04deccf5166fb1cbe3e5e793b37e79e8d90fa140cb973
-
Filesize
5KB
MD5c893174f01911a2d76c9c07f08dd43ce
SHA1c65ae40d4082d72f2c434eea1900096a1c1a0805
SHA25654255b19439b0fda649fba5ae68108802cf49bd7812df1dabc6279372205e3cd
SHA5123d010cb2bf7e11b514163f0b8bfd19241af73c1f097665c56c126f1cd62b48ae37db838b0d9253094a57a6c68b5e78ff7e841037d23d129f64ac7828516c2f2b
-
Filesize
6KB
MD5fafeef5b7f3610fcb5617d8912e8808a
SHA15555eb89fbb4c82bb1f6256283f0f6ccb9c05d6f
SHA256310ae9d6c85f5fc72b7ec9b56b47fab8ce7630261b553c64dbec3aa84f503444
SHA5127f785c4b3b1b9b9ec628c62b3cf9dbc9ace3431fe8405ee787934b9a433c01d70a643c054c1030ed97b05d67c3214b3a23595d40e234180fdde1de90fec77640
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5baf414105f4c1e5abc673646ab0e06a6
SHA1529064103d9b749d00bfc2cfdd4e3b6e73bcdd69
SHA2569ce4891a62196120de800a7e0e42bb757f93eeb1d77253c48ee2c02387ed8c3f
SHA512c80cea349d76bc1f9154c0af036c7c1a7c718a5d1552d58701b1161c37a99c649cf91518662e2ac9633e5e917b5eee9caa59335209bf32d6a90253e4b0c6ab26