Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 02:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://condedqpwqm.shop
Resource
win10v2004-20240802-en
General
-
Target
http://condedqpwqm.shop
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 60 msedge.exe 60 msedge.exe 4432 msedge.exe 4432 msedge.exe 1676 identity_helper.exe 1676 identity_helper.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1968 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2952 4432 msedge.exe 85 PID 4432 wrote to memory of 2952 4432 msedge.exe 85 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 1628 4432 msedge.exe 86 PID 4432 wrote to memory of 60 4432 msedge.exe 87 PID 4432 wrote to memory of 60 4432 msedge.exe 87 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88 PID 4432 wrote to memory of 4532 4432 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://condedqpwqm.shop1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebdfc46f8,0x7ffebdfc4708,0x7ffebdfc47182⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,4874972282206000559,13692104912976691600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD546726f6ef28de1966e23c1438d40e21a
SHA1578e4bcf42bbe8c47b6b5519f720670630ba38d5
SHA25613c8923f46d800e1116339ff2b8900c1a4aa6e3f7e5edd4b2f99a2ac45e1bcc0
SHA512355cd2db721c37294988a64b51a7553865ad75157848800e3dedcea4e5a973127e89b1f8d9edff44e5dfda3cb621749681aca2a2effbc714f20d428abdac78a9
-
Filesize
6KB
MD5f0108f103368f13c38cce89f930062d7
SHA11baffbf33f8bfdc30da36435e56bc61df3ce406d
SHA256720ebad84e293d34302b4856d480bf969f18ff2141d736ab12cb244757bd512c
SHA51280d9f340bc180d7882d1f3ed967058ec27ca465a341ac7a42fe8f1df9940443d22cb3a1a6bac9149b6d3ee354ff6bb770e1b4611e53c5c66092270de7a274f65
-
Filesize
5KB
MD504ef575bf845b7d62fdbce9dff0f257f
SHA163428753eac2f0699ed2f825bb5d0c3d0aec2676
SHA256ee8f2031914b10b822317376bf12cd4e6b9a4240a5ace4f125acc7a76165c45d
SHA512b88e1596a9ddac5bd0cc52192ad158a4beab438eb4ef7f16e46aaf33994f778475594598ccab240720065a2c263a2764c387899d4881f229bd611f976edce913
-
Filesize
6KB
MD51f10d451e93fe4d173907c7db7c278ea
SHA1bc593533b558696ec73f37b71ca640299856a908
SHA2565b3d8b1f766308e0513831f62bd34c1df275f837ed38fcb156a0cb3f78989fae
SHA51254cc9bd24ab52fb093c2368b497237b9ba7932398a40844c9ecdf90d99b574bc84b8b1d8ea56cc6e4eddecadcfea1f5cad5579e8d1aad152afa2ec2e6dcd8d23
-
Filesize
6KB
MD5192f806e988fd5b30094b113ce1abf48
SHA1dab4a33eaa0c8752c97d22b33d4a8ebc0202d207
SHA256ac2dcd505bff9f2eca982da5aa3bd917574182aa3ae444707bb9e40cedfc056a
SHA512e2a429cbc4769d753dff6f1f9fa01fdbcc369999043f8b740e058a1cf2aeb938a6d1593c4747ecdca5ff527acc46dc4d64373ff03c4ccd9e4cab7d75f72d8dd9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a6e01b5a0f9cb065a98433c56f0e4c27
SHA18f62e716376625804868ef54ae8e36fdf9d09df0
SHA2563c71065e0f21276e540f4d4baa178e98762f74be0d117e40476762ee5c58d9af
SHA51247cd8defaa1e2b2d9b38e94ae2050feb71b43d6fa8cf94894eef066b960b2161654cad982e7c8b5c58bae3862081bb41f6385b6325a2c212133fecb82666adec
-
Filesize
1.2MB
MD56d2314dda88aefe8d5519d8642d3fa6a
SHA14dcdc9dc7560b3d4d61b4f244bc18de17c3d5ae3
SHA256bd7ba68a6ce1ea3768b771c7e2ab4955a59fb1b1ae8d554fedb6c2304104bdfc
SHA5129bbdfcd7b9524f48e96b2ce6cc74bab20242885f208d1ad4117336a24642f3355d1c379e6041a4c341e31fb15faea39fc4410b6523164e3179594bbfb5fc35f5