Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 12:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://albrechtstudios.de/portfolio/
Resource
win10v2004-20240802-en
General
-
Target
https://albrechtstudios.de/portfolio/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 920 msedge.exe 920 msedge.exe 1128 msedge.exe 1128 msedge.exe 3204 identity_helper.exe 3204 identity_helper.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 544 1128 msedge.exe 83 PID 1128 wrote to memory of 544 1128 msedge.exe 83 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 3032 1128 msedge.exe 84 PID 1128 wrote to memory of 920 1128 msedge.exe 85 PID 1128 wrote to memory of 920 1128 msedge.exe 85 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86 PID 1128 wrote to memory of 3528 1128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://albrechtstudios.de/portfolio/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15749040954076481702,17586289657477088166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5c574e78875f2be94d377e56c3eb0e6a4
SHA11b7dcbe613101a9ccb67183be05cece086d16ce4
SHA2563ea013e025eb976900c756c4c2e8e607870685559a31808957c6f77a2ac99a8c
SHA512a998f7b1d9bbbceba6ea91f655d5db856e796caa7e5b9368f55ab434422299c37a58af50662d73dede310c9aa93c3997b986d5da2b428e1a34f94f355be50ed5
-
Filesize
581B
MD51404eba3212cfec91ba4d4a27546dcd5
SHA13a2d9e4472663ecf3cc0000691e65a1966e09a1a
SHA256f808f6e188042a44476ac7517c8aafb7b9b4e0825e34966a8ba13b056072a9b1
SHA512345e59bb0c3a7eb7689599a3d71631bc61459f36ab8044f52877c73b6ed6ca27b811857e64b1fe32b899691ee1f7562390e86705016db9f64e3b5cbda67ded27
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD554288ef35523c7252ce5ca727b8c8046
SHA14835846e73ef595a2d7116dec3df58e92ba1d3d0
SHA25690953a54f24a13f46f2e7c1bc56e5e455005106255c8c826692d8f3036362887
SHA512ba30413dd72fcec9abb5b2155a6b006776d475689f1f3c45b45c269338d54517c627e6bd633c637cb0e15f77e39a81a2df7b1fc5b3bf375049ca15c236e5baaa
-
Filesize
6KB
MD5fa36e05eb31402c8a4de37bce61f338e
SHA13a767da9235a8a65ca02daafa3f901a57365df77
SHA256a9103f5d30c101fc0d0e5de91dafb86d3c5c75bd23534543aa486faa04fe5474
SHA5120b672532cb829cafcd5023b669a6e37aabb7c9c8770150ce5be5f937f3cbccec1f8e23a15bd2e497152c74ed564173f7a22e270765354976f66a72569a372585
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582441bf8c72b0f47843f7becc702869a
SHA1202cae7391d96889b13be1d85921d99a5a05d0ab
SHA2567e7be35c83e1e26b45478bd2798fe750d1267eda264bcdcc29f2f78f51822c4b
SHA512a94290788869b023fdb7198abdd31e7f6473743f189ffd6b34bd6413b38b3edcb2b716197e406c615b141d233ed9210ba05593e0769742e797912e4f4f25ca74