Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/rR4tRg
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/rR4tRg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 4520 msedge.exe 4520 msedge.exe 1796 identity_helper.exe 1796 identity_helper.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2908 4520 msedge.exe 83 PID 4520 wrote to memory of 2908 4520 msedge.exe 83 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 3636 4520 msedge.exe 84 PID 4520 wrote to memory of 1428 4520 msedge.exe 85 PID 4520 wrote to memory of 1428 4520 msedge.exe 85 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86 PID 4520 wrote to memory of 2936 4520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/rR4tRg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,17776440399920324295,7725982281002464958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5c105508-aad6-4441-a430-921271af3034.tmp
Filesize5KB
MD500b6bb60e01ee11e49454fac17a82dd3
SHA12cf233c43b47827636244b5b081ec4d721822b4b
SHA2569cc35ae48a0e15d3a063739d65992beb9853d1aec18fe2d0580cac7d0edd58be
SHA51252fb653e2724c7ee6df5a21c3903224c8b66919969151f99c6366fab7ec6e9230e3d751f18f4dc22b1e42c557e15342e0c5f0e73639290ba4ba7dfa1e27b022b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD57beed2ac00a38883564ce1f83c9d10aa
SHA14ae1942bd8b6c569507f9c8777784869d4c1926d
SHA256b46f38db1a4df3670602e1864343076e88a95fe2a2ec8d32d1cd54b5c9d0b44d
SHA512af553b6d3a4d8dd798ab5e8be86a17ad5494a53cde4b6f076b424d54eb40d389c3261f5635f674af5c30b377a5e7e8205d7c13490b3a394dcf557fa347d88e48
-
Filesize
317B
MD5afc6cddd7e64d81e52b729d09f227107
SHA1ad0d3740f4b66de83db8862911c07dc91928d2f6
SHA256b5e81a7c7d80feaaa10ee7bc8aaef9f21a5c1e4b03b3823ed115022311d674a0
SHA512844edb69585153c378a7c97709983776fc9303a32fb5ef8122ecca32adfc0b265f5ef7118ee07814da5c020ac7ba1bf2a2f66d46312e4d8e6df99aab2e5f9b2a
-
Filesize
6KB
MD59c93f46961b8412193e2e6513618ac39
SHA105b32c607dd8018fb199dfa4a4a3e346f03adc98
SHA2568bb307e7445135ea02094054d23811b8f1b4b7cee0a2af1b1d218128a3e8a80a
SHA512e5306cbae28653efe9aaf6ef55f2dcd9a7216a34adf1fe1d59d858b2bf33eaba00a0ae396c4b0fc00616957bd6d1e18088122384fb6f2c5b93b1b274170ac578
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59ab3712da09e3b03f8b8a774e2a2667c
SHA16c22fc0339b7571ad632141b8bc8f21d250162f7
SHA2565ea1325f72c1da1c36a9cfe5e926b0fd430b5387096bcf8c8cbfeaa2a5a54bd4
SHA512ba4fb4ab10ec028c0b0f8fadd80c11cf4be5f2a45ce50189f437124fc92b944da9f8a585e667d12d89c8726bf9b5126d76437d9bb95a8d8b446e372b837f9a20