Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 07:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sogel.it
Resource
win10v2004-20240802-en
General
-
Target
http://sogel.it
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4656 msedge.exe 4656 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4112 4656 msedge.exe 83 PID 4656 wrote to memory of 4112 4656 msedge.exe 83 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4148 4656 msedge.exe 84 PID 4656 wrote to memory of 4772 4656 msedge.exe 85 PID 4656 wrote to memory of 4772 4656 msedge.exe 85 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86 PID 4656 wrote to memory of 1104 4656 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sogel.it1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff882f246f8,0x7ff882f24708,0x7ff882f247182⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2788 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17364320992701087439,16828542136770533706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
211KB
MD5e7226392c938e4e604d2175eb9f43ca1
SHA12098293f39aa0bcdd62e718f9212d9062fa283ab
SHA256d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1
SHA51263a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD547c0b9db1a208d3e2c90a7663ad07c38
SHA190392b465edc3ee013641a2a76e006c4ab62573c
SHA2565521962fde7001b482bc835e77cfb71226d13d1a9dc16269b5fd03dcd9d2c63e
SHA5127e6fe2fb3ba0e91a3707427e99aab232998927bf1e74fd02d09b03fca3b8d87cd550ec3a262b641bb2536937ba3ab1265a20a7d166c116ea1a14990b114bc25a
-
Filesize
1KB
MD5a66a40bbec8ff28d657617017715e340
SHA1e331e85d8b3b4700cb78d5cebea37d553a6482fe
SHA2565b8796afcb5b55696373718abad4e2f99d541ebaae2f4e6371d9968a095b4284
SHA5124b156fc7cd8f078e1df767fc76830d304a72fe966290c8956c164258ff83eaa1d128eefd2eeb71a03e3001a49d14a1723dadd6eff9979f58f264984eeb045d38
-
Filesize
5KB
MD589df51444758dfaa973748bf4f464a31
SHA18bff13a905992f4964be31d1ac387ea8a5a24a32
SHA256c2943dba289951a7a82d69778cc8de107ccc68f648724574d0d66d985d921d3c
SHA5126e45a638ea1f3514d2936a258065a6e63dccc7e8ee3677dfe183596fffd25c37598ac2f1f7cb0e3ab9ec837228386ef5db2630adf60d1f81ef1dd1ce508156fc
-
Filesize
6KB
MD5f404b3e9e9dec5ba62030bd65e4a5da7
SHA11b2c2df2b52ed7cc3eb3616b8622f5b1bfb7ebc4
SHA2567a29452569cec018d72502e0a361a3feef0529836caaf334da7532a569b6f73b
SHA512a5fd17c3084397987ecf877e304d288908e23a0ccf22fa0498fa99cef98bdd2bfaacd0319a91e9f789e1cace8d69c7f74a18556d1f420107569b2f17d73a5933
-
Filesize
6KB
MD5f404883a87c043c1933b5edc7ea1e126
SHA1998899f92d01d5cc30a8447209ddc707ecd79a9a
SHA256a58c69bd3bec7fe9e14bdd65fb0e8a18c1c39909a3431ba81a9917c8d6867655
SHA512f28b1fda4f1f800d28e694af3ac461cdd48a9e7ce11add2e6d560184d71368f800c3c12231d3a7e03a07e0a86a933eb9048b42d14b8ba4d7293078a60a258b6c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a319e851b0d3c86fa42bd6eb8856b131
SHA18f716e46486b42c1dc4a735cddebc17a223d5089
SHA2569ec44fffcca75229197fd8587ba7fc0291f3ca41a7b50307325711d0898aa416
SHA5126867f05db9b8758eeea0ac075ff1b4e30113381dc2b047c1d2026e84d5e7f47a4183f2822e505b352ee72b2444d4d286ec8e7f3e5142316e002eff63859f3670