Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 12:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1bstuGMLer-fbJbcGG5JiqnleKTSKvq5y
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/uc?export=download&id=1bstuGMLer-fbJbcGG5JiqnleKTSKvq5y
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3768 msedge.exe 3768 msedge.exe 392 msedge.exe 392 msedge.exe 5112 identity_helper.exe 5112 identity_helper.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 2128 392 msedge.exe 82 PID 392 wrote to memory of 2128 392 msedge.exe 82 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 4252 392 msedge.exe 83 PID 392 wrote to memory of 3768 392 msedge.exe 84 PID 392 wrote to memory of 3768 392 msedge.exe 84 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85 PID 392 wrote to memory of 4092 392 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?export=download&id=1bstuGMLer-fbJbcGG5JiqnleKTSKvq5y1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91c4a46f8,0x7ff91c4a4708,0x7ff91c4a47182⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3568 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18320231553522004531,6817951416436774324,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
795B
MD55999e5925c5e34ffcc06547bf96f21ef
SHA193d7237a9b4747a67db03fe986fd5d600902c4c2
SHA256e84d5c05a81d28384d9f796d49586c9b025b17ad323b6adad1771d788313d96a
SHA512dd387d7a0147f342499cfc0773f37ed0faa43806d68f40be2acd4ce490496e0c2aee072a9712fd9068bf10fbbbfa2d5df39c30eddec8e7b7b18586e3655f6c8c
-
Filesize
5KB
MD572cb996663fbd18cff32a826b2782e55
SHA17d0f5f460d75935f3a0dca00133f8b51188ea75d
SHA256d2898810689b06edb9033dbb2d5b5fd5484b740c99ac2a3de2a5af52db7eca1e
SHA512a27800680835f18dd7eab477bd9e5ab2f4be5154058a5adce9aa4ff719518350536b01792f62f325da2ef3cfb31f7057d931463f596669f29b34317d403d825c
-
Filesize
6KB
MD52346e40bee4934e6d5aa49e17ac43e58
SHA174b2800e2eb4861dfd0630cb41e2330eea3fdbc8
SHA25613441c77b5f642b48c537e1e11577618aaed5b5c354b7e55db0debbe31df4112
SHA5120546b098829c09f527861157cf42b40b8951f8ce1969b61fcb2221c747a5738da0397ad24be7f19e6b68c90688c778fe20c967e372abe545e65b0dc4c54270af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c1657c66ee1c1a6fc5c64e8d2eaa66e
SHA1812f32bdb37deaa5129a32b42eadc493321ada1a
SHA25694818123fae1e59bc9051a80411c0484f733545e32a3b36934800182dbdfad2c
SHA5121b28c6bbf28afc023250465abe67dc35792a5272b2f865c8171bb356d4309aab90561ddf8647be91e8202275a4957ff71e8e3eea77b6beeacd9da6b662d2cbc9