Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 18:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ic3w0lf22/Roblox-Account-Manager/releases/download/3.6.1/Roblox.Account.Manager.3.6.1.zip
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/ic3w0lf22/Roblox-Account-Manager/releases/download/3.6.1/Roblox.Account.Manager.3.6.1.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 1840 msedge.exe 1840 msedge.exe 1748 identity_helper.exe 1748 identity_helper.exe 4876 msedge.exe 4876 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4500 1840 msedge.exe 85 PID 1840 wrote to memory of 4500 1840 msedge.exe 85 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 3876 1840 msedge.exe 86 PID 1840 wrote to memory of 2876 1840 msedge.exe 87 PID 1840 wrote to memory of 2876 1840 msedge.exe 87 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88 PID 1840 wrote to memory of 4592 1840 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/ic3w0lf22/Roblox-Account-Manager/releases/download/3.6.1/Roblox.Account.Manager.3.6.1.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa579246f8,0x7ffa57924708,0x7ffa579247182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5779309402495769280,12839877000577530662,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD5872d57b492416c937dcb599bcaa9032a
SHA14e92a19ec14d78d899fd7669510e2b20ee7fc169
SHA256264b94151afa0c40d935634c2edb089614a42000e2a28362a8ff3365a48ee88a
SHA51218c9f16f806b9f217ac0d3d4453c32433222fa09a4651aac4e9fb377cb0cd57356112981fc765b39f30a8acff46d422e4bfbb4ba2239865011910feab437fb5b
-
Filesize
6KB
MD5608b2ba4ae739fff97b7f66111707400
SHA106b17f6bf489c49ab81612f25f1aa2c945360bd0
SHA25694e58e11766b14315a5233d2b150dba944f14bfde5170f108a516b0b4ab57e6b
SHA512ef306a0bdedea5f58e710563121fab0861ddf0b39cadc7a9d109525f4b51ca47eab59b85e1602532fb384aa379b0178dd6b6cb29070bf3804d21a416ae01a80f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5001dfa43740b1f7ab2e109f4341840ab
SHA1e1988dc3c5150903f040ef3b25a31d6fbd86338a
SHA256143e2affdd9a99181b26d208935624e910fbe2d734f6caa47d523de4b7a6c000
SHA512b7743bfae6fb0555202e41f3b7096dddc8fefc79846d8ef8cc52881b18285ae15838eb9c7d08487fb8d5127a8ae13a296448fddd7f0f9b9a53ab029caff6b9b7
-
Filesize
11KB
MD503e9577a712817af355f6a51e656c122
SHA119ca5dd05781e34f1e2b258accbdb91cfb99c77d
SHA25680c6458ee8035b480bfaa3fffd7b39c65565df13bd84e06ca9690f6bf88138a9
SHA512546770cc687fc7a4e768fec8b610cb1d18b5cf1a94475d809a3b040641a5255a70d5680ddae227e84a72aa4310bf85431e98e482e14387adf71d7321912cca64
-
Filesize
4.0MB
MD5acc4818f58f1a1d2d2844a05f1aece19
SHA1e3038c4501bb62415c18bfacca92167ebc4d623b
SHA2561b94210a7a05ce8379db7b8c11d41f84bc868cbdcd0685733754728678bb5fa2
SHA5121ca986d1ea6c8c87c590d891b3f29d5123e565e8ba2031728aa2c4b96892a18f00b478b6589ea73f056ec04ff0d07830fa5393c366eb849e80515971d6089207