Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 17:41
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 876 msedge.exe 876 msedge.exe 3688 identity_helper.exe 3688 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 876 wrote to memory of 3160 876 msedge.exe 83 PID 876 wrote to memory of 3160 876 msedge.exe 83 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 872 876 msedge.exe 84 PID 876 wrote to memory of 2172 876 msedge.exe 85 PID 876 wrote to memory of 2172 876 msedge.exe 85 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86 PID 876 wrote to memory of 1624 876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://acslawyersmicrosoftlogin.tria.cloud/?eBIRs=JlMb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67b646f8,0x7ffa67b64708,0x7ffa67b647182⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12791732166060305455,7335573216853395425,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD54f83ea72eb5575e7b4ea8d55750b6a7d
SHA1b455b3d98c37e03fea1a6d66d0f25d19a0dc0b72
SHA2567a9f94fbbd2ea995c5a8b34d93101170957498865e301ebefc2c13457b684076
SHA512edb86a7af748565729a63eec137b27e359ab66473d0c42a2e69d7ad6b71faff335b49457711a0400928d2ac55899c127be74c0f2ec193608498d53aa04503b7e
-
Filesize
289B
MD5829660b315447b5c71221d08c751a38d
SHA1988b0783e20ad1a91feec75bbbc1ad2e656b597c
SHA256c09e84855665373885135ff475caa3f426d108ab1f32e192a44ee58641e0cec1
SHA512d661348348713565e6701025f739eba316654d74a2ef53e49f29f8ef7794362cd85287e305beb071dfd456b3802aec99fe7e18fc74110c5b0b6dfe149ac7c670
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD56498d68ba1445b04c3a4818c6ab371ec
SHA16fcf7b0cac5eca31c8802ae58e532938d3d1ed88
SHA2565bd34204b5467cfb0df833582d28e27786731be28e3465f211013c4c995eff1b
SHA5122b2cccab9c13ed4521817def3214ab57ba12a9a670d7b7698bfdec03f599308a4b933bf21391159fda1ec8ee38550fdedd65218b4f36f456ddea941b58670b09
-
Filesize
5KB
MD54e23e0a0d71c27309ccbbb369dfcbaed
SHA1abc790bc3e35f5a8dc2505c2c7d0fa2ea7890a28
SHA256f35b1133bf63341cd51042943ac740b8be79884a706dec44611be575c69a4b8b
SHA5121c0e5d00d000aa689b1a96f1957b673aaa572f1e5c167ab424797d9e6a62a81381563a18bc0c128816e0a85bc7f73717e50d6315478c7531d7bfd9ea13ebfdac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d81e360bc967456da8c3909124c2115d
SHA19a20be0a9a141b7f49f44769f5a8d59928ac8729
SHA25650188197d778e15b47d6ba3d6c674377ca53008c2406ba257e59162424cfe273
SHA5124a177456d38f289d88060b592c9997024f6072d10d2821b0f3f892045b2afbd68b4d31374ac026cbca515088a1fb49e1ca645cc8ae1b3f4a0327db2fe2d3d795