Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/09/2024, 08:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://get.activated.win
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://get.activated.win
Resource
win11-20240802-en
General
-
Target
https://get.activated.win
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 72 msedge.exe 72 msedge.exe 2304 msedge.exe 2304 msedge.exe 4912 msedge.exe 4912 msedge.exe 3244 identity_helper.exe 3244 identity_helper.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3852 2304 msedge.exe 80 PID 2304 wrote to memory of 3852 2304 msedge.exe 80 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 876 2304 msedge.exe 81 PID 2304 wrote to memory of 72 2304 msedge.exe 82 PID 2304 wrote to memory of 72 2304 msedge.exe 82 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83 PID 2304 wrote to memory of 2032 2304 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://get.activated.win1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe56bc3cb8,0x7ffe56bc3cc8,0x7ffe56bc3cd82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:72
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,3978486935843394171,3824745756941247618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\88ea01b3-44bd-4bb9-a53f-c2d39de3f01c.tmp
Filesize5KB
MD56bd529d3992d6e643778684390168ab2
SHA19f173eb4ecd06ad0176c806142136aa4647c0db5
SHA256c3bd0daa731951485b362d212adcab768c5bbcdc85a8a8933f38de57e4af8d50
SHA5123b4b0f4eb9e84a1bfaa97c3d122e811dcdeb7d08e60000145931599c96badc7f746cc54b854744667a2ca2d396c327f2d6f8cfd6ddb93c0caee987115f1d9b49
-
Filesize
185B
MD5b3dd55b01513e6956d5d818e9d4d725c
SHA14d54adb1810298e7c13feee3eb76a34adcb3acee
SHA2564b75aedfd8c46457592250b60ce3bcdc03c12e2ecc452d2a096cebfb956610cc
SHA512cac127feb67866c47c010a6afba68fa142b8f198fd05aff1a7c1d7a97e04c020e7a33127bd2966f2ffb212fc9f7b54d818fc0378d8f9d586340490bcfe8254ab
-
Filesize
6KB
MD590fbe5909c99e5b98bfd57bc341dd745
SHA1ba4e6c7060c5fe0cdfdef310fee3317376f51022
SHA25690ffb827200007db9bdaca4e137a0b14d1d53971d97f8a05587af9462b6e895c
SHA512b3ebdfe01a3e0c39cdd48b00d060c51e24815ae0a6863d2cd28dc921c1bdd8ca609c22d2742c104c2c2debe006bffcdc3c1d4ad38e9718dce18cc0abd0bd6879
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d1afbf4e8d6fda08ebd3e7a58df8abbc
SHA16bfcd04dfab1a12dc94bd778de9e75fe6b4565eb
SHA2569043d1068f836a0df169103b7a25aaaf6d15bf96de379212dd48899a271ccee4
SHA5125728b45d04cac5f10779b74427623297a269e011bbc241465e0d961484a9ed4d783de6ddb122f3eb03e45ceddf8c2c785dbf823697011212f1fbb4f996cb10b8