Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/08/2024, 22:59
240824-2yqeyswdnn 324/08/2024, 22:51
240824-2s5bxswbkn 324/08/2024, 22:48
240824-2q6rzawalk 324/08/2024, 22:44
240824-2n2egavhlj 324/08/2024, 22:43
240824-2na8aavgrn 324/08/2024, 22:41
240824-2mdl1stdmd 324/08/2024, 22:38
240824-2kq5bsvfqj 3Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/08/2024, 22:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youareanidiot.cc
Resource
win11-20240802-en
General
-
Target
http://youareanidiot.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 2976 msedge.exe 2976 msedge.exe 1388 msedge.exe 1388 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3488 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3488 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2496 2976 msedge.exe 81 PID 2976 wrote to memory of 2496 2976 msedge.exe 81 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 5080 2976 msedge.exe 82 PID 2976 wrote to memory of 3268 2976 msedge.exe 83 PID 2976 wrote to memory of 3268 2976 msedge.exe 83 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84 PID 2976 wrote to memory of 828 2976 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youareanidiot.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc66253cb8,0x7ffc66253cc8,0x7ffc66253cd82⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13552160108997185369,12557425154246560609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3200
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5026e0c65239e15ba609a874aeac2dc33
SHA1a75e1622bc647ab73ab3bb2809872c2730dcf2df
SHA256593f20dfb73d2b81a17bfcc1f246848080dfc96898a1a62c5ddca62105ed1292
SHA5129fb7644c87bdd3430700f42137154069badbf2b7a67e5ac6c364382bca8cba95136d460f49279b346703d4b4fd81087e884822a01a2a38901568a3c3e3387569
-
Filesize
152B
MD5228fefc98d7fb5b4e27c6abab1de7207
SHA1ada493791316e154a906ec2c83c412adf3a7061a
SHA256448d09169319374935a249b1fc76bcf2430b4e1436611f3c2f3331b6eafe55a2
SHA512fa74f1cc5da8db978a7a5b8c9ebff3cd433660db7e91ce03c44a1d543dd667a51659ba79270d3d783d52b9e45d76d0f9467458df1482ded72ea79c873b2a5e56
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5adb5aa4c64a5e0a063ca1f43d47219c0
SHA18aa489ee9cb34e03e8ccb18e2a236eab7db366fa
SHA2567c70e94c1f39613823959eac536a0f1e150f91df29c0ff2f637364360ce67a8a
SHA512cffdf73afd575786f7037d65a939ea4da3c28054ede93432ec087b4d21b8af12763df40c1c3a0e717cf05532e3e4cd929a067408872b38724adefa48b3811a78
-
Filesize
184B
MD5b88f247eb29ab18ceefffcc93358b1df
SHA17695a17a01bf978f93603de7349ca8e52bec87c4
SHA2565a36b6618062d5914e152044e662f742f99f433655d106e7e59d2b005d5702c3
SHA51282ec3d18f129fd6d8691c7890ce7268b8211b1b21486e37dc43bb9000ceb29f79f429c0c9a933d0356a415823f53502ab08c5eb2af4fae272b337b31ec70e558
-
Filesize
5KB
MD5dc8290e7c7922171223270dfe73816d5
SHA16b44ca93a31d7563afef4a0d831d82a555e451b9
SHA25696f577e9083362624bf51ff66524089967299c87246b1b8210a57e56804a095f
SHA512401fd39a0d059ab49ef7c659cecb9c47152113cde8be16c36286e2e9cb878c7b67e9a6c37efd1b8b08fcd604b8b03a6f1daf841f49efad8a365dff613964b107
-
Filesize
6KB
MD5f94ee02ecf7309174e810e8d6b13db01
SHA1cb651243e11a0d9e942cb89f3dafaae13c6a1d26
SHA256ab531b3dfd62e286565f50fd650dbc8fb95924a9de2185334a98c9f2c2435851
SHA512cb395cb9808cf3715928397b8ecd1d04b273da0e68a16f5295386fbf903fa3fc6edf28016ab92eed14be886d89c329822a421af5e2c2971d15569df4bfdcec92
-
Filesize
6KB
MD5a43f0f4898b7b7d44e037b4bc52dc883
SHA1899f6a34076bfe2f3d9512a1aefc920361c256ba
SHA2562c58d43ff82db91e5c7b08616ebc9f4250104b3615f817fb693aa0957cc6dc37
SHA512b7da447a6ab9f99d4e607f08e92eea931f00cc46f5b813dd579afbb778e790ef97b88f70c7bb2495e9ee908ebadb733dbf86c72a71311133ea707e4aae89d4fe
-
Filesize
6KB
MD5af5e200883f2b2452041525883a479e5
SHA1bcd39f16e1b3d9f068aa61d79e9dc67d75c8f987
SHA2564ba7c9f746fdddb1fb8ad6245cea1955556c2be4e1313de400eb0f55500b8007
SHA512cf2cbf602fcaaa318a8d00ea2cc4356db53def90d04c1f560ae9d6943789c0264c8245d7fb9c990fcf228cfb7ec09c277824143c1b777806781f6c96fa715fcc
-
Filesize
6KB
MD5f160bddeee7940a71872482753a17684
SHA1e061983dbefcb4e9791a4ce63bd178dcf6bfd796
SHA25601cbdc8743be43b11e4eb4361093534854a25522d128f9c52630e2e296b42ef1
SHA51259cb90cad587680fd8c508583e2f5d6007a0550f13dc16b907950284068466aeaddb7fdcbd08b2fa918941a36b19b1161cf51e5b46b9347412f4c25b910a2e53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5960d111a29502c61ba13be4657ca0bf6
SHA1112dd61596d87605a3914f8b2ee54313bc2c0d6f
SHA2568f8e17f1304be7a4485bbcd8a5b0d639b8846bd80a112af0371ce304370ec60b
SHA51289b280ea02fba249f1a36a462c1fb9fc49598d5e806079e2405c3d9f1cadbbd6e1bf93dbab73d0604acba8a0edc6a37d49bbafc8b3bdeb4872b7c1be3c02d227
-
Filesize
11KB
MD52ed813db97ed591957669fcf71aab503
SHA1306e8094f9f0df33adeacb2758b50da886a95823
SHA2561ae949e18fb66e13c53d28800ce2c810e113ee0dba1da33463d24d3364c71b95
SHA512bf4c0f64c335575c4c14bca4eea7c007c527eba64232d1d199c6db20fb9532cffc21d4f1fee8362bdd2211630ca488053ee744eeeb7b1ba6653c1b1a60760318