Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
277s -
max time network
296s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/09/2024, 20:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://audizine.com
Resource
win11-20240802-en
General
-
Target
http://audizine.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 3360 msedge.exe 3360 msedge.exe 2784 msedge.exe 2784 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3360 wrote to memory of 1868 3360 msedge.exe 80 PID 3360 wrote to memory of 1868 3360 msedge.exe 80 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 132 3360 msedge.exe 81 PID 3360 wrote to memory of 2656 3360 msedge.exe 82 PID 3360 wrote to memory of 2656 3360 msedge.exe 82 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83 PID 3360 wrote to memory of 5068 3360 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://audizine.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe178c3cb8,0x7ffe178c3cc8,0x7ffe178c3cd82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2060577547937097299,17515951145150484107,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5ca55aafbb41861dad8f4d69a9f936cd0
SHA19be1e1f2443d055aabbac890838427d342316249
SHA2560dd5efa51f3fdbe5d8f0393c5741575305f5f5da0c898629008de1aeab444bd2
SHA512df99eb86a77cf4be0aeebe72d3b6066bb9be45a922805a1d0c6ae99fd7af5f54a2b785a8271f599adbe8654f61a829baf3e4dbf519ac1e4f91ccb6b07f9c0060
-
Filesize
152B
MD5d30a5618854b9da7bcfc03aeb0a594c4
SHA17f37105d7e5b1ecb270726915956c2271116eab7
SHA2563494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8
SHA512efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77
-
Filesize
152B
MD503a56f81ee69dd9727832df26709a1c9
SHA1ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b
SHA25665d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53
SHA512e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5e2fc1e7771e83d3bd338d3e7985d6be8
SHA1066a68b8d8c07a1e7038e70387bb7bfbeca5d851
SHA25602c45b61e73922f52a03774f6a650c1ff7a2b9d0e984740831c54d925b3f23f7
SHA512e4d3eb01d57941ef25ab29a22fe98b84782fd0851512d6ab9962a118a1a78b7e0a8a0cfead78320fa386d1ac5a5052e59e66593b81719d9abbea6d06a0b96508
-
Filesize
2KB
MD5359c9bc3329887da37274fa8d8a2e383
SHA1569ebd9f069fc2712df8eba9aa3ae25c225f47f5
SHA25624507b0b3917fdad1ac9f19c230402dfc92ab1d4851ca4c05dedfa44812b54a6
SHA512eb7b3c4002a7553334cda0d63c5c005e648a17333ac1f149665c9ff422dd51520c3800bdf00da6423035d3e353d1dcbccc175f6a1c1e08f1a8b44b2538a7c01d
-
Filesize
5KB
MD5271bf7e25974abb3ff8a2bbc74b736e0
SHA14b22b2ae6a819c72271da76e1f0cab9b6991206c
SHA2561ae4ae2e494cd7fbeda1dbdd64a3dd71a9e2e829d5c2bc46278e544c29c4ce15
SHA5121f824c4f9e23417c258d38f5060f625c3c1edecbd5e4e6788deb4266e2872235b59c3b0ff63dd11fca84929e12d10a7c5e3b4ff66deec2b45d7cfa74e8d61df0
-
Filesize
7KB
MD50f3ea990a40e1aa907658154fff87f42
SHA1f8463a67ac1a369a37e9d7b7007fcc8bd4af0e68
SHA256c72faef03172d598a6f052e029b42a31e170de964f0d350ea29616a44b0aef7c
SHA512f2015af70692c10525ffbf140fd2c8370db601e479dcb896f4030cde75a3068b08c299c836727a60bf58fcdff970ba10dcd24a65f984945e40e21c8ba1a537cc
-
Filesize
7KB
MD5e55a0addc78f275c2acba6b7ff4d6eb8
SHA121321c3b20c6937a670521c12831363a8af1ca9e
SHA256cc9143d5c3bee8c10b10632eb2659c28478bacd3d1f0f4de9bd7fb5ef6ad8085
SHA512d0639b515dffa9ae49e972ad7e2085462fb140ca05a52da852b9bc1fb30f3dfbe86cabd03332b92902707078b0b379dffab0b8e3cfae2535dc6ac4085e9df05e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593325090a8b90ace472ab643c5e6ad7a
SHA149f5c5adce5ce7b079eddcd9fd3722b849fab980
SHA256ee446a5ef0ed7e7f3f3972284fa5194193bb91f323077ec7ad8f34bbbe547b91
SHA5121b2f5d129261bbe9660b7ec60237f9c2d9ca819454ba19213482ec40db51f0eeb156c8b447e664763b16d4c9673eddb38c42107aaa04290982be13929791ff66