Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
251s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://play.google.com/store/apps/details?id=net.voicemod.soundboard&hl=en_CA
Resource
win10v2004-20240802-en
General
-
Target
https://play.google.com/store/apps/details?id=net.voicemod.soundboard&hl=en_CA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 64 msedge.exe 64 msedge.exe 4696 msedge.exe 4696 msedge.exe 752 identity_helper.exe 752 identity_helper.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2180 4696 msedge.exe 83 PID 4696 wrote to memory of 2180 4696 msedge.exe 83 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 3108 4696 msedge.exe 84 PID 4696 wrote to memory of 64 4696 msedge.exe 85 PID 4696 wrote to memory of 64 4696 msedge.exe 85 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86 PID 4696 wrote to memory of 3648 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://play.google.com/store/apps/details?id=net.voicemod.soundboard&hl=en_CA1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,7253744815142815714,16422248581240879944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD55709804e1bae6372403fbf658645f9bb
SHA18d66ad31f3d184f9776d7bf51e8cb76cf550732a
SHA25685626aa0a8de3d41cd48940adea5d97f1c7f8dff7d78e66458239423576fcbf4
SHA512ca256dc3e1e40d54b1513585977204ffb648e33be2be22b337ec60bec60b25dd3d06276f29a471f0045b98f5221cbb9a5967af7a38c166a9b6e9f67874434259
-
Filesize
2KB
MD5c2895405b745faa63528c8d58857e6e7
SHA191613709f4d6fd845ddad20c50b13b477047dba7
SHA256434845e8abfd893ab7121004fad62b81ab3ea6cd48e649b4471e31a042bda742
SHA5121c52b56861ad81208cc4e5d778a426a1c749a895da4380814901944256901357cf39467f707b110a7cd7e5f2f4701a0f00670d458085b553b6b8a0cc9c03149e
-
Filesize
2KB
MD5fc8ad54f65b1894af48bb7281a36070c
SHA1e78643f6c9cb29e51eef52889d4140d3ed6d8243
SHA25655b32dcf1368feed5fe43866d06006f7e809da31584e95b9a7192a31ccdc29a5
SHA512a0cf21bf4cb55513c2f942ab84185e8536bf8ae688bcc9c1b5512ab92d14c3417ce5c72797fdadd47f212f6a4c2fac4e274dcd610ea2e6be8e460080d2a3bb42
-
Filesize
6KB
MD5c0a927a5b294d87cf2f2159c2c7de83c
SHA119d62fcf77e69bba0adc10097c14ee8b524b37e2
SHA25652e5affd65376395be65f2fa61e107bc15caec2be3aaa3e5e0d23acd85f45d61
SHA5129a234d90b764f54680f76bf035bb8ebe584aac8c11fb73c68f722ebc53ec6f132ee6cb517ef72b8a25105a2dc1b544ffd0ba10b98b62c3aea2c3bb15a7b05575
-
Filesize
5KB
MD59065379f5c1f5e0ba7931479ce531355
SHA189ffc148eb038b6168d17457322d58da76102857
SHA256a8e7b41766bf7aa682622ca53a7e9c5b71914859f741394b71653b8c404f2af5
SHA51282b10008f85f3d2782220d6bacc571208986dcc9104e987facb14183e3889bcba80c9ed3f41b5945915b170c0560154bdfbf8b342240cd2531020a03e83d9b7e
-
Filesize
538B
MD54a3893f5b3d99a39507247f53843226f
SHA136356b1608c7953a9fcfdb974589e14799591402
SHA256d060fa9645d5e4fc6c5df5f7eb59ac25312878dd8cc7920e1db99257d3ef4126
SHA5124f5fa8e60d6169439195bcea6accbc9b666066fc32085e7c7e87651ad9a724144e5ba09fdbc720ab79277935d5607a2eb93e0986f09f6629dbaeb1182d252755
-
Filesize
538B
MD531ea55764a3413b20d5794577a22e3cb
SHA154df87c5cecf1664502525aeeb811c2c486e83fe
SHA256860a3d3eacf3bcc2f432cbeea0d8e3f5ee0e3797ccde3bb5776eaaa59753fe8e
SHA51242558f97ebc0e8cf52296487c4806c01e1da6107f31dcf1a95e31be6016653df7e856e0a9a329ad5e275d84f4fb0f3706fc7597e17e9fe399a3d29854d8239a9
-
Filesize
538B
MD54108f0a59b5847e5251c058d043a9cf0
SHA1dee9441d7fc0d4c664afee6adfbf3a08b697fd17
SHA256bda018dd550ff036a852403b590ab9af91b79af22d29a4f0436fed51763a58d4
SHA512500f42b9374ac7ed14b6a10a8edcdc01c7d4303588ab35dde3a3dbea715b0b466989b8b654854b02d24aedc9174050c5f12ba702237fca7fcbd15aef9a79fd26
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51d7461ce6c10c0d1e100a783514a19b4
SHA1a26d0b4599416e055fbe9bf134656a164910b197
SHA25625b75405bc0f7006104b6f70c918aa918bd7f04bf723ac8007d4734bc375c1a9
SHA5128f4669802388ccdff4a63f931f40103bb019d86b470d065d7a202e561e7ee07b86c0b2fd0236e9099ce33efe49eeac553396f9fc0522a39034678484003432dc