Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
27/09/2024, 07:23
240927-h73bbs1fjp 325/09/2024, 06:40
240925-he8yeatdld 625/09/2024, 06:28
240925-g8ljjashrb 325/09/2024, 06:13
240925-gyzneasdrc 125/09/2024, 06:10
240925-gxdpjszajj 325/09/2024, 06:06
240925-gt4rkascnc 3Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 06:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.wixsite.com/_api/invoice/2e2a5a14-e43c-467e-8e24-878e7e41cc58:a803af1c-7dd6-4a14-977a-062311ec44d8/view?token=dee0c81d-a2cf-4699-94df-dc31c781c707
Resource
win10v2004-20240802-en
General
-
Target
https://www.wixsite.com/_api/invoice/2e2a5a14-e43c-467e-8e24-878e7e41cc58:a803af1c-7dd6-4a14-977a-062311ec44d8/view?token=dee0c81d-a2cf-4699-94df-dc31c781c707
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 4564 msedge.exe 4564 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1856 4564 msedge.exe 82 PID 4564 wrote to memory of 1856 4564 msedge.exe 82 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1816 4564 msedge.exe 83 PID 4564 wrote to memory of 1808 4564 msedge.exe 84 PID 4564 wrote to memory of 1808 4564 msedge.exe 84 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85 PID 4564 wrote to memory of 4932 4564 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.wixsite.com/_api/invoice/2e2a5a14-e43c-467e-8e24-878e7e41cc58:a803af1c-7dd6-4a14-977a-062311ec44d8/view?token=dee0c81d-a2cf-4699-94df-dc31c781c7071⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeed946f8,0x7fffeed94708,0x7fffeed947182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1392058853217232750,15281473288533632058,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD522abbfe13918c5efddba1ec320361acf
SHA11b422a7a2f6f61766a177bd0dba2833b2cb8f258
SHA2560d9a82e99368d445a62d7d5c9e74db4adcc74bf6cc0e0119d74f83c35dde83d6
SHA51240f1932bd8241268b3cc0cdcc87f87c2bc2ca6f38eedd7158225457ce77bb7c803280de1d915397e57269bfb55a120eb159349dc5c98975c3abb2a16d7799f4b
-
Filesize
932B
MD5add47174bcff56d27abd1a697e86cab9
SHA132bd1d9e7d0647352b4bfaf575bb489044f3fbdb
SHA256eed9256ce6d0bc8736388cc848d9d5a2da6b5a62c202cc92128919299c0d63b5
SHA51286449989ebd14c06f9eee7a19b797cf3a353da4a12dfa0ed7d9cce570c386ab88f6872187ba8f968f87ed540172a16fa302bc9500c33bd49a4105a94095fac3b
-
Filesize
5KB
MD58effee21b0b2f95d9fabbebc24c408ac
SHA192fc7e3037951ec7b44cf68724173ef4fb518b65
SHA256bb6b5df2eb6ed13e30b09bc5cf5a3e46f81d498ca5b26b726ffa8f4eb0844bae
SHA512a1ae896dca87859a15bfa29815fd3b5e76335e9b2535c3c3ce4c31224221ae151c9df0b65a4d5c3fc50ca5eca979b3b999c41357e4d4df1fa7012c1283694dbd
-
Filesize
6KB
MD52f42bbf845a0019db5d69e46203c6e8d
SHA1109cffbb924222e196524bd632ad83072294fe60
SHA25649350bae12dce6f85ae8e63a18d7c0536a2fc68c900d9ff0228637853363ccbc
SHA512b878c3e855b636752a4bc4126221965af612dbe6321710c46aab5474f2b0759747a1ba120f7834adba33c4431f741faaefaf35778cda79a2a740e90bca403aa9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b21f9ef31ab4b09a7db2ca84bc413cd3
SHA121f654bc0973bb4cdb20c775ecb35e1c3575fc43
SHA256705d5cc89b3d989063d0760ba5c294305ef00dc02de3464af98a70323a728eb5
SHA5126f755f4d5dd14629a4e3730c899a55ebbefc8adaa5c86ccb5274e3722b7177679d34c2c8c3d404e1bdd169ac10bb2da56906197079a93178181176ca977f693c