Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 10:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://n17a-eu.rcs.revma.com/3x5uxtcxgkhvv
Resource
win10v2004-20240802-en
General
-
Target
http://n17a-eu.rcs.revma.com/3x5uxtcxgkhvv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 940 msedge.exe 940 msedge.exe 2836 msedge.exe 2836 msedge.exe 1920 identity_helper.exe 1920 identity_helper.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4332 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2644 2836 msedge.exe 83 PID 2836 wrote to memory of 2644 2836 msedge.exe 83 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 4368 2836 msedge.exe 84 PID 2836 wrote to memory of 940 2836 msedge.exe 85 PID 2836 wrote to memory of 940 2836 msedge.exe 85 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86 PID 2836 wrote to memory of 2492 2836 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://n17a-eu.rcs.revma.com/3x5uxtcxgkhvv1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb538f46f8,0x7ffb538f4708,0x7ffb538f47182⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,143693470663492540,184239843883879458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x470 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD51c45af731faca889cbfafb3ed0102f36
SHA1fce06ba014b5a33e0dda4b307119dfd4872cb50c
SHA256ee77e32d8d884b9f88387b5e1c0a06c0cdd9b55b186ee346d4a3ef54d0019ab3
SHA5122a3b937cdf23bc608af79359dbcdbd784ec0cf29cd2f97fb64a49bb98f72cbb2106d743933b13f65f15e758aad516b22f742808ccc21be72518d4673587d0284
-
Filesize
6KB
MD50daed0abdca18b2a029e4ef4a38ac9a0
SHA154739064af0215a7ccb4821880d750791c12f04d
SHA256cb6c03998ba86933985e11666eab1269f685375827d0377bb24c687f7f55e5c8
SHA51232c032599540129612d910e7f222e5a165802f82df7f964e7443042b6161c377fc15eea04a20448936fd02f53bf290b39859d473fa30762b880a795d2373a7ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c606c54698d3c9ffd19d40e51924e3fc
SHA1d47914d3714d28a9a2208cbe6d922e7ba62d634c
SHA2565e14a7c7e8197e6b64af9278552017cc8d2bcffa464ae53b826d271039c63a7f
SHA51270ac6a0208a1aa1eb348172d341f2a8c40965d0ba49e3342d8af201e04b372c4bd0586854babf4e9efe2bd5aedd198bcff4dc0e93653561acd83f956d86a395b