Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 10:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/QAPFxR
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/QAPFxR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 6040 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 1508 msedge.exe 1508 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4060 1508 msedge.exe 83 PID 1508 wrote to memory of 4060 1508 msedge.exe 83 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 208 1508 msedge.exe 84 PID 1508 wrote to memory of 4512 1508 msedge.exe 85 PID 1508 wrote to memory of 4512 1508 msedge.exe 85 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86 PID 1508 wrote to memory of 2704 1508 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/QAPFxR1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfad146f8,0x7ffdfad14708,0x7ffdfad147182⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4016 /prefetch:82⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8163840427140814535,8442249859611284012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:5148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5548
-
C:\Users\Admin\Downloads\14uBETA\14uBETA\14U.exe"C:\Users\Admin\Downloads\14uBETA\14uBETA\14U.exe"1⤵PID:5880
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\14uBETA\14uBETA\imgui.ini1⤵
- Opens file in notepad (likely ransom note)
PID:6040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD526f2cc1b7f272c9261e691e8013d860e
SHA1a41a245da0c4eb7e2a383d9803f019080b42bfd7
SHA256755c48b1cc5c83e5646f5cfe78ccfbf7997b68f11574a30d2791d208b1529bdb
SHA5121056997b2e96d14e067073598fa494af82d2260f018a6b57730617a0d3660c879a06bb3595a9ddf0e5ac67cdc9197f3c5a636d157fb858eb80d8df50214a2c84
-
Filesize
5KB
MD53673acea5e426264cfe7d97664302ba5
SHA1d1e90d8fcb76a70347eb774250be9997365f3e2c
SHA256731b926e6dbcc9742bc0b049cb94b44880c1ec71b65d2a20bc1677f6841f614c
SHA51285b3f16da65aa1225c15908be290ead894608cbd2f40ab5e65db0d8b9e139ee0ea4af18f316cc79a3d59adc480859f1b300e82b917faa2b38d89b055a8482b67
-
Filesize
6KB
MD5bddec8aed1aca8150c0b9c4989cb8730
SHA17916c8e65d82b49b0e5c8e2158062ddb2c2532f9
SHA25617a394c1d0547173b36c7d221935e34acbc31f4700626eba4567632e2ac2af8e
SHA5127579d1ec7f454a00881bc0543c5c342dc7a0351e2e49822cc025bfc337e7a2d1b4131ee54295ca54517834795d78d9a2cf70018dc4ec96d96eff2da69622b1e7
-
Filesize
6KB
MD5eecc3926128547182302151ab0258e3c
SHA194f71048657810f2f764fbf01d91c3aff85c182f
SHA2565aca8121a948e3d163f3bfdf8cced4289692ac2956b54380571cafc073adec20
SHA512657bf45f1257b11d9111f3ebafa8b7b77b2235f5474487cdc683bcf207fc99fc53a59989c8b1bf527488186fb55abce191047e7f2ffd9678b7223a4e9ac91086
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c6af9fb73042af28f5f561d5ced7710d
SHA17735b41486cc61a16c694a561ad33e4b5ff4b239
SHA256e7f6506fdd586c085f37474b0077dcbae6a921ff1e7dc80414be74dc7905e9a7
SHA512d152ae8070fd5b72d4bfe64f7d856ab9cf2947b424f3c557adae5afdc854d0efbab562009ef656cf0be5cfa29a0c503b1d2053ffb755b76c65a49e97439f8e0a
-
Filesize
10KB
MD5d2f85229e1b8d9260fd1ff556f3fe5fe
SHA1f0ae7eebfc1808949e0317429bcf91602d2075a9
SHA256149fb0158e4271096881c689df752f588cd94cb0d3e05c4ab2ca62243179688a
SHA5121184ce695efa2e44c01909d79bb92337e8b009b73acf526a34743813de888a53e150ab0b67b57f629eafbd381027fb596f5a69324f87d24e3e9644466c8d10af
-
Filesize
1.7MB
MD5838e06718eb85ba027305db31207ee8b
SHA1e67cb8dd414087372f6fe48361e35b1b94ccf478
SHA256587f61f6df2e0ef56d6b420ce0600dd8c1532317de8fb104cc5015a7cb4cebf0
SHA512c9e0a0b1d0abc7d430ac14f6b3fff95d299faf886d0ab54df265aecab02f2780194dd462e894923867ea601607789b94e06b80abb4ba73301dd21b8c2f32f9c9