Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 08:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.co/oY8zW27wxG
Resource
win10v2004-20240802-en
General
-
Target
https://t.co/oY8zW27wxG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 696 msedge.exe 696 msedge.exe 2592 identity_helper.exe 2592 identity_helper.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 696 wrote to memory of 4276 696 msedge.exe 83 PID 696 wrote to memory of 4276 696 msedge.exe 83 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 2892 696 msedge.exe 84 PID 696 wrote to memory of 4008 696 msedge.exe 85 PID 696 wrote to memory of 4008 696 msedge.exe 85 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86 PID 696 wrote to memory of 3492 696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.co/oY8zW27wxG1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2f8c46f8,0x7ffa2f8c4708,0x7ffa2f8c47182⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10371842166190879218,12086089427236043293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5372198a4d59ae34a688f88546bb70355
SHA1878c40c7e8fc73fd30e38bc1ba42f18eb391fc71
SHA2567030366479d8bb6f8137d07a93b14c131ef0301b4496d4bc36f6ea82bcd2d95f
SHA51234f19bfab73bc4d0b6af56571d3254e44c5d0d3cecb346c1fba4d79b2e1a7fa9549ab7e039852b7218c024afe650f22bee50b17204dcc012f9ac76676905b6ff
-
Filesize
741B
MD561d5bafd3eb16132d74342091ab2dbd3
SHA156b596cace145c08aacd0e320e1b304c4f4e5039
SHA256a0aa4a756828455c3409fc80312e011c91e6c6f7b4d5a5d0255f67b2b5a5de63
SHA5120400e50567f5e3a1b97230efddb74ee81b3c559d0551501767f2a4606e7aaa9ae9772c092cafaf2c650941070eae9c8932b3f47265f30df2cc93e13372925a2a
-
Filesize
5KB
MD5932ae25cd509ae85f657afc3ca637558
SHA15f472a41f0bcb2951625ba0dfb28730fdda2330a
SHA256196cd1347811e92a0814247d063a78be706ce20b9a60c93b506cb3f347588996
SHA512b4f803f23352ed178098e1503aff7721100903617b69a1aae78c3c8297302dd2481c8841e2dc85d18d28568c6b8b5b7573fe5d6bf13bdfeea22bf363b8766711
-
Filesize
7KB
MD5b54a62ac9f5c4a89ccc5f02ae3b980b1
SHA1480d211920094bd1a13451a2d2e6b73d895a132e
SHA25693b0e103ca9ce171e4f77e105b142544b1fab76c4d18dd626a0cc4e3ec25ce81
SHA512bc9f37de3b4ddecadfcc97acc8c3070379e0ddb69ebd19869ffe2a95af2a176a2ef0dbffc5162f7e9f3002d1eb0441ffea6ec0cb12fb4a489a656af9e72573c8
-
Filesize
1KB
MD5fbbfc57dc38d0d66f6cbc748e03ace1c
SHA142167d33ddf688dfe61e572825ea084e6807c54e
SHA2563b2716194a50a416a7eb3dc674c259bb4a0da6dd09e75666fdcd97e35c14798b
SHA5124fc6f61c7bd4b673797b2afc5cef1a640825d53f805c64aa375d0e5678ef7725cf396b0fa2fad64b960abef59de6faef1ba80b42b66fc595ac30b99dbdde8715
-
Filesize
1KB
MD516229f709a8e2a1df4e81f7461710a73
SHA1c50555b786f13a9b7914481706feb4b82bf74787
SHA25611cb83fc53cee3ac82d8f0af50b969451b429ac532f6a6b82d7cdb6abdfdd097
SHA512e21639a69f30f0d999169ae356e93c06d20ffcf5f192b9b2732e1b7644bed1c2bef3354117fcd6b32e9af7c54ab77d27f1ddee26e1a81bd8ba66ac06d2de45bf
-
Filesize
1KB
MD594c6a2e0a1ee9dd08c52bd3e6ad75157
SHA17ebc01a1e7f99b2dbc77bb1336e5da58e931995d
SHA256dc1ab8e8b0880a4936012ef72a1e02b2a191b5ff757ed94b92465ee116997807
SHA5125be5e76277440658dd846773cd0dad47f311dea65797f3eb404d967a7d420314437127000965bea7b8218df2a2eec5f7b133332ae863257a26aff3b316f2edb0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52b173b405e959db3dfa0a1a1ab7e31d3
SHA19e7753651064367325dff954f7a533f43dfe9a3a
SHA2565d68b43df618d7ef6edcbf511c26e7a54483b6dd6c17f08ec5d4839334b3afda
SHA512c5b92f2996ad9da9ff1cc04e5325b680435d3e0760da14d4aa2b23492396796fb7055e7d1967eb6303966ff501cfab094ef45d54c3c0d71dd7166217bf7f7c0b