Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 13:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/esp8266/Arduino/tree/master/cores/esp8266/umm_malloc
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/esp8266/Arduino/tree/master/cores/esp8266/umm_malloc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 1200 identity_helper.exe 1200 identity_helper.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4100 3456 msedge.exe 83 PID 3456 wrote to memory of 4100 3456 msedge.exe 83 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 4532 3456 msedge.exe 84 PID 3456 wrote to memory of 2488 3456 msedge.exe 85 PID 3456 wrote to memory of 2488 3456 msedge.exe 85 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86 PID 3456 wrote to memory of 4580 3456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/esp8266/Arduino/tree/master/cores/esp8266/umm_malloc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8d7d46f8,0x7ffd8d7d4708,0x7ffd8d7d47182⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7753728238812373108,2658396521005326580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD56bae85bd8e7c097a3d810e9167d461fe
SHA1999fda4bd42b8db423c88f009cf83619dd5514e7
SHA256dea7d237a57e99e53e71758afb986abce5bcc76fbcb389a577233a00d9f02a0c
SHA5120d2a6d1f00535f4efd9f18a254c3aa0ba55999fbeb2031c902a2e04ad66812809e41994dd7d2f5672618c3903d4d35dd831b3ffc336e4f8201185af89cc76d6d
-
Filesize
496B
MD5c4897aa78d9edac4710b6abd9081210d
SHA182fff6d6a6c64af2e1e64a0a56c46cfc2a3470bf
SHA2561c2dbad9b7fe623f7907fe8875ae1df241de6ea09e8dbb063b885983420fc005
SHA512207439940f16c3a029f465c4f4b6d290f15deea00c5d46365d2bbe5a27c48371315a7a5e39366638a4d256c843470b6e9acd6fc7c0b85aac10dde6176aba026c
-
Filesize
5KB
MD57ca4982e3ac90f1088fc5e005b6f2774
SHA115412635fed304546c74d0bc817d55063e371b89
SHA256f4b1879ce20272fb5477572fa2aad2a9c9595e04c8b3c264bf874723eac960bf
SHA5120818f8e8abc603eb7054d1a6e0c231f1fedf3f6ab283c817b7b315f19d8fac45ffd5f226c0e2b0ec11c73aab2ab2d689dd3936e08ad374ec5af50e850bba9691
-
Filesize
6KB
MD5ba1b8854561eecf1212692cd262185c7
SHA1355a17673b2a3cec083814817ec9d9b3abe1a12c
SHA2561de4f7a849a26d33d9de70a812922375ebd506a080c29c84bb217d52c4bdcfa7
SHA5122e7b916df5b81e5effce2c123faeff05649a74813237fd103301b0bcb31e5e6a97c4e8d422039639d115a42bf6e37618a916bddd0b5de25601c62200533a320b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a6ff269ade50148d68d1356f10400c5e
SHA1f0ca6ab00e9d540bbef71ab377b9668b5c387f10
SHA2569231d74cd95bd10c86071a849e8512e0badb6859d005c08deb33d8654d71d49f
SHA51285d764f42fb9d4935a3a8f50e630607ac4be72cc2956d21345b23414204252d417565bb0cba4f39469d965486e9b8bbb80cb44969bdae9e0568384371e642e06