Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
277s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 10:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1AAODgMXbl4o0j8KGZWKbT9ceAEswXWbI/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1AAODgMXbl4o0j8KGZWKbT9ceAEswXWbI/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 3732 msedge.exe 3732 msedge.exe 3164 msedge.exe 3164 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2420 7zG.exe Token: 35 2420 7zG.exe Token: SeSecurityPrivilege 2420 7zG.exe Token: SeSecurityPrivilege 2420 7zG.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 2420 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3732 wrote to memory of 1564 3732 msedge.exe 85 PID 3732 wrote to memory of 1564 3732 msedge.exe 85 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 2168 3732 msedge.exe 86 PID 3732 wrote to memory of 5016 3732 msedge.exe 87 PID 3732 wrote to memory of 5016 3732 msedge.exe 87 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88 PID 3732 wrote to memory of 5096 3732 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1AAODgMXbl4o0j8KGZWKbT9ceAEswXWbI/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1fdd46f8,0x7ffa1fdd4708,0x7ffa1fdd47182⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2517116782627474233,14105565973638090473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2792
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\2keyAvast Ultimate - DriverUp-2025\" -ad -an -ai#7zMap28543:130:7zEvent143011⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2420
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\2keyAvast Ultimate - DriverUp-2025\2keyAvast Ultimate - DriverUp-2025.txt1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5b5c902ec039a38653c3a34593618aefe
SHA1f3b8e5da74e9ff4c632361c6eb89bd8e2acbb63d
SHA25645f1e83115f300c9b149d8a30fb96976886fa970848ea68bcff7b980a5781fad
SHA5123ae0ac026a9c7e85b48e51cf78b9f0591e5435bc1050774a1efb7c89ac81314e5b5a829b0f5c2fccfa28be9535ef4c6ed2bda53010094c418600c58346d8b836
-
Filesize
3KB
MD5c447c900d528274a51376f1e3f3cd971
SHA1e515269bdd7c9bcf6bde99368372dd16038460a8
SHA2562cb7301ba2130fe0bc3e8b99b801becc390802e897e8431729bbce00191df8fa
SHA512d9a026d54cd79345c0646bff25f30dc97c83076f6f0b12975ffc9abec28bd368fe00bc59ade0cf96ce8213e2e25048991fae8470882a7434f33967e451c245b1
-
Filesize
5KB
MD57dde767904ecb3473800288519972351
SHA1d2c99e5dfb0ec2c8ee503d761c9985773dff1c23
SHA256363d7eedc42aa70c7fddd8c214356a1658d1dbb788256c7fd1e325af2b089717
SHA5124e9e45f81f072911e773d05869798993df5883cd290ac235a854cffa8080cecbee6150645840e55a1ce9987e6b243338387763f5cbb44f3bc7a628ff8dd3acff
-
Filesize
6KB
MD528dc07382ad4f4a5349f457670d176fa
SHA184d7f47a25e1a388c425d09c01b87a86dd296071
SHA256ac156a4ae78a8dbe8f4eb73d43a42596238ddc24e454406c50bbc9557e46ebd4
SHA512cae903fdb8f8de3c0c20792272b7010e0ea5ecdbd77d9ad61598e701a830851ca9e0b39d49435f2499be06a51a998bdf10c2d544882ba55b5bc6bac52e1ceff7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5017d26043228f648005d772e50f08c29
SHA1a0d0a749ce662f00795a8dff763eaccf32f6b0a3
SHA2568f7991a2fb0dbfc691318f4d1778029cc55d64bf99ff0be345e270ad1f0dd964
SHA512c44bfd7ff5fc000b3fe2a179a7c89e8327cf9d24a47a0e33e90372a13fe24dc5788238600c3d43ae5f26dfc2cd8f9f05206f864052e7087eb55e03884c43977b
-
Filesize
349B
MD524cd3e96d80b0d49fef29befaf50c56a
SHA1f3ffea654ce1c00b508a2df7f894b7f3774381fd
SHA2566ad0e26204b122e4cbaf84526a9e3a55be4107c1211ca90db7fdffc26804452e
SHA512cb59d8fabe9287525411a479fca7850f63eb00a32fa01a570ee409304267ca37d4c20e8804391f6a84013e2151bd85eddb4ddf11d2cbc4fd73bd3f802ded2ee5
-
Filesize
559B
MD55da5a59a29cd2e34a880ca3a47175568
SHA197c2a5aa0b98423f7834598603afdde6d939b12b
SHA2561f01823142d241bda33bbf92bc7ad58622aa658b2a98f10fd47a5f2c4346aab5
SHA5126d7d00650ba6b4727e3a7f95c713be3bf67debcaef02a807caf3c3e3e7fada9de66a84bc9b1712e3a41093f18ad9faa8728a1b52950c9a6814e88830b9be1df4