Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 07:05
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hmtg.ezlawdocument.uk.com/IdNmt////////?e=ZGYuZGlyZ2VuLnNlZ3JldGVyaWFAbWVmLmdvdi5pdA==
Resource
win10v2004-20240802-en
General
-
Target
https://hmtg.ezlawdocument.uk.com/IdNmt////////?e=ZGYuZGlyZ2VuLnNlZ3JldGVyaWFAbWVmLmdvdi5pdA==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 2440 msedge.exe 2440 msedge.exe 2548 identity_helper.exe 2548 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2220 2440 msedge.exe 83 PID 2440 wrote to memory of 2220 2440 msedge.exe 83 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 540 2440 msedge.exe 84 PID 2440 wrote to memory of 1912 2440 msedge.exe 85 PID 2440 wrote to memory of 1912 2440 msedge.exe 85 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86 PID 2440 wrote to memory of 8 2440 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://hmtg.ezlawdocument.uk.com/IdNmt////////?e=ZGYuZGlyZ2VuLnNlZ3JldGVyaWFAbWVmLmdvdi5pdA==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbdf146f8,0x7ffdbdf14708,0x7ffdbdf147182⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9941390149284161399,15991347204662318026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD524e9e1bc486312e9700fb5c217497aef
SHA1891ac4ecc5f8397577a73f8c3c3354b11cf585ba
SHA256991318aaeddf9c6cbd2d92162518e7b86963c3fe43b7bff82561385ab0fda4c5
SHA5126d25457f3dbbdfc26377301d5e8245dd76a33e74283bd4605f11be7de8e246109186d82d85beda62e3f49f36321b567dcf61f8bf11d04637c6504c72554f2364
-
Filesize
1KB
MD541cc8bdd83a4af1bb5091e8fc56196b4
SHA142dc3de4a2db1b80e736e851e2ee18eddbdaacfe
SHA256a73d8cc4c5612979a38adcdb40c8f69124c0d7116133091714b0f99c9c353362
SHA512c640684bd766df8e6d4ae2fead319e782b24e0555e7a51c2d4babf938b0ff103d7d62ac807ed090a5a924673655805b3ac07b1bff7e3a8060a59259dfb206675
-
Filesize
5KB
MD5ccc0620e17ad6c3fe245bfbbcd5e02ab
SHA1fc532d0809101238765af5005b6c86d5f87b642c
SHA25637bc19b4b776ca79de53962ab01252b971160ea353372437b443c5a071f24931
SHA51226bd11cd86faff2cf6db49d41bacf3474ef88ae3231b7c452dbc9020ab1c6633ca70a64fb245cecd19a1a4be8d111582df2064a0169324f17b5288e198c5994e
-
Filesize
6KB
MD53b877de549bea63abfa298f85aa617ab
SHA11841b45dec6ef43eed4ebf9326012296b96d7139
SHA256caf61ec417f939c1e39adde660fe6088c107b612745b0f29bc683edaa6d0b39e
SHA512ee11d34ed70ca9a81e719f2335a042a903e7a2bd12f95a80eaa1e957edeb77094786316f640da56e7a697e66f912415bd8a5110a720ea538218ecb764a84181e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59b456abff2731660eaa0a52900c0711d
SHA131b3c07b4a7cdcd7e2c19ba41d75a3a4ae6bd819
SHA2568cba19e15d93c498fa7091421c730dc57f4854ebc6d815dad2d7bf841646ac2d
SHA512f39c2f5d8798f4a916442df1a556468f183defab4cd6c9281b769431048900a45125f303d31600a926434401d6a44ebac2b9e6196a145425667ecea36eac7e28