Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 00:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/5briufjtlla3x6o/FusionHacks.zip/file
Resource
win10v2004-20240802-en
General
-
Target
https://www.mediafire.com/file/5briufjtlla3x6o/FusionHacks.zip/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 212 msedge.exe 212 msedge.exe 3872 msedge.exe 3872 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 548 3872 msedge.exe 83 PID 3872 wrote to memory of 548 3872 msedge.exe 83 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 5100 3872 msedge.exe 84 PID 3872 wrote to memory of 212 3872 msedge.exe 85 PID 3872 wrote to memory of 212 3872 msedge.exe 85 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86 PID 3872 wrote to memory of 4404 3872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/5briufjtlla3x6o/FusionHacks.zip/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe26cb46f8,0x7ffe26cb4708,0x7ffe26cb47182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1651214691151820941,2626145109522743115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d9f8a0b1c58d82bd1425dc909bbddb2d
SHA1cfd66f664c2f7dce95640dca8f146fb1655f3820
SHA2560414dffd745f5472870bf3805fc9b6bceb6537fe319c6adb7e6eb46452fdcc14
SHA512a37af0261960655191c62c03be8ddf13bffe95f9ca4da8c65f3b33f38ec9563270f7dd257502f7d14021f05ccf0b30bc2e9152c4f7d98750c4fa9324be049a19
-
Filesize
1KB
MD560a66d00570773c37add8b19c7c3a380
SHA14f2c65058c676001e7570d1435712810e258b55f
SHA256afdb925d90e634e07dc70ac1ee4afd03e8bf3f988453b1042537c2002779f065
SHA512e3b08cb8351a2946b5349284a27b7b831446d6d40c7230bec2bd235928888249d14233047a13f94e3f52a19a954a31132ca369a59eec282fbc9397193a66836f
-
Filesize
5KB
MD5290b6617432dfdbcf74361b10258b907
SHA16320701c067547bf32943177b39e88df5e83cec1
SHA2566522d2ca51b29ceaada28cb293621bc953d1ec42a2fdde6b46b70636d453d0e7
SHA5120fee4fd2f3b6c906c99497f1e9fb1f466af856b43076fbcf34145d0281afaf931434cafc65c2b45d7dd0bf8a1c8bf5141250567b903493a9046def2cfd95b29c
-
Filesize
6KB
MD5ca69d30b462fb3baff56e91fa14208be
SHA16503a371cc8d2e77a97a006c40b2e296c1a91493
SHA256c338d47318d051bd65248804d9a0e3e49ec3f5ef6c00f778f817af03ed5a4fbb
SHA5125f2151d47998f83b3a3d1f16a0e52f81ae71a0149d70bfd5999a63181b3133b6eb61204dd2c8b5a6a1bf58d85e554faf892e802d09d3f1677b19eeb9d04a5755
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c0c340021b02b5667b27d75d3d2012a
SHA11862ad13b3a1c13f21fc0f51be4d3b93d6dc2982
SHA256b10924640e555cbe6d8ac74fc7c4e7e7381219fd42f0329131ce8cc9c9d2809c
SHA512e8a3edeb50fde7bda3c2267fa89e644e75610eccc3bce5100529a45bd0e93aec93a8d11f13e4610463f6513976875869973773eaeb90ed8add4607ff421c323e