Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
549s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://is.gd/pV6C6t
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://is.gd/pV6C6t
Resource
win11-20240802-en
General
-
Target
https://is.gd/pV6C6t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 3480 msedge.exe 3480 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4884 3480 msedge.exe 84 PID 3480 wrote to memory of 4884 3480 msedge.exe 84 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 5100 3480 msedge.exe 85 PID 3480 wrote to memory of 1028 3480 msedge.exe 86 PID 3480 wrote to memory of 1028 3480 msedge.exe 86 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87 PID 3480 wrote to memory of 1492 3480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://is.gd/pV6C6t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9835546f8,0x7ff983554708,0x7ff9835547182⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11716223775296486712,17360927703231731614,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD58f44cd7fd4433a9284af1419233245e4
SHA1253d3d1ea98dc68748c41a0af4f4fb3db1a6592a
SHA25658d74ab4082f587b699b46f5bbcca0457a515e95ed8e9010b5028948e3c941b7
SHA5120d96fc76c98b7c50bd382c9aefe807ae78134c5fe289ac6ac408eb47defdbb22435fbcefa451875e93f9f0a78d2998151691b82db3ea581f0566c8de36f10357
-
Filesize
963B
MD5b694722c6793837296cfca2665908335
SHA1331ad9d82523d4c25af6152622307f7ebda344a2
SHA256ba8e3ca2662be2f643272214bc6c6f933c1f5fc034ef9d5637fad0ad51814784
SHA512680f5f3713705f61f2c2dd0a88203f64eaa52c131844f093ec35d9dedc59402401669d893bfcb0c102ebee0f01a53d67026810432e9a263c043a24b9e568b15a
-
Filesize
5KB
MD5c11fa8d9cc706cb1cc63e9da0e1f044c
SHA144589709e7226fcca27b3796721758a24706701c
SHA256574a6fa8567c91add012dc06728b0af8ea806cff4a787da06c4ad41c7bd56229
SHA5129a4c8ae14b408d97ebdcd9889b87e9380bf817fc875fc7a7f5409855fe420ac61366e3ff2cc9bad21092615da04b201e52bffb986019eaa2098313d2fd57b895
-
Filesize
6KB
MD533b05ca256d609f58444db472a970405
SHA198529cd20412de82e2a53e5b47d7a55184fad635
SHA2566134ac1b91646aab7a25417f2a5d0118dd3ba35cdab9fb0ae0e9ee38eb11890d
SHA51207a520c789194a5d71f0d209cff169cca6a8df02f169c9ddb6c77ca1c228c1c9fb5d9bf65ce84da3274ebaa419b1b4da7b5db9d4da02fc1b4f302d60cb4b8d53
-
Filesize
1KB
MD50a6a2041b38aa35787949e71f9809912
SHA12ba9d933df8c67c9fafb6be004d036cfd140d133
SHA256f32303c831a182d235f73e156b286c6b93878a345612092df54410e6b965b395
SHA5128f85673f516ff3aab14fbb17158c73cc960c59c45fb81ec11b372a9e19c8888d68c608c8d97539fb91f2ebe7a61d9d73c574954d601b700d367a0075205cb6e9
-
Filesize
1KB
MD5a46d0a92485e87b05edb877e8d74c341
SHA15127797450a99b522074fb49a262a54470ae5339
SHA256ee15f600f984660ea867d295882c81a052eba8cb6b9303a5c58afb7afd93fc3c
SHA512b462e580f2e953ffeae3d772b44b036376cc02b8efc99dcc366156a796928d8b5e45009a7248b774683948b06bc6b1ec41d4e665865341046482b01866f4b9d5
-
Filesize
1KB
MD5a5192cffcb8894e1002b872e0836fb3d
SHA14d76cc91af5d565c2f564213a89892b16e5dc92f
SHA2560cc4a00ca80663a2bca746ea554d72a0ff57192205177b5f817e878b03420b40
SHA512b8d141381f235931710e475e3fdfc585db63c26e95ea6f11a718671aad0cc26f65bc32e1f773228e66b09ce4687038f1f0020e8fa09395d95951b904300190e8
-
Filesize
1KB
MD5c8deb2d11eb746023fa9a344f6a2154a
SHA1dbfbffa790e9cc0eaa5c577c0fffae11cdc368b2
SHA256746ce7280f93ad0e28826fcbf85ffb9868426f8e170d0f5017aa81b93e78f242
SHA5129ec46d8040eb1f10957b55d7a28428eda46b9e163423167455229bddb74655ed031357ebba78b94125fa9a81b673a2ca781199b4100e889805d0ce6bd880a1de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b8e577bcbfa3b293178dff9981bf94b8
SHA1e2b4c6279e8957b55ec0214435cd751241d576c7
SHA256238424b242ebe28a950730358d145594c6bd92f1fc6442d2bb0d25b79e8ccc64
SHA512c6994396aa9938916be396fb1acdec9ea3fe89c8a1bc338354e011407e87dbeea3d9c8785d061f286141c443f7cfbd1a86f7becdba2363bcd389ba515f6bb185