Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 08:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://control.leak.center/#/login
Resource
win10v2004-20240802-en
Errors
General
-
Target
https://control.leak.center/#/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4376 msedge.exe 4376 msedge.exe 1988 identity_helper.exe 1988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4488 4376 msedge.exe 82 PID 4376 wrote to memory of 4488 4376 msedge.exe 82 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 1900 4376 msedge.exe 83 PID 4376 wrote to memory of 4764 4376 msedge.exe 84 PID 4376 wrote to memory of 4764 4376 msedge.exe 84 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85 PID 4376 wrote to memory of 1216 4376 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://control.leak.center/#/login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacade46f8,0x7ffacade4708,0x7ffacade47182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2787316814197148016,11341664201708706878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5eeb824456c5a954746c48f39fce8d5f9
SHA145b36030e417b4d545beda0c542b4a7f9d02d973
SHA256b95ab5873d319bb0201a9bd980f0db9f4f5d70b862c7ceb2eb920325fdb37451
SHA5129be684eab6c2556c54c76d03e88cb98d42b6df61ad1d94e580406c10bae238394ceaf56f97bfc6bf85914aae183d2b462f0480c85c9a6138960fc612c52e91ae
-
Filesize
260B
MD547aba7aec33dafbb3c6aa1864c35cc83
SHA1c01bfb7f105f050e81d4b6b2c59f05292066d5c5
SHA25629bf68001007187b436943f2276cd3c3619b90443f92a921c6e7775fe8901a3d
SHA5124a82af907eab6c5ec06ba9520769e2894b4ba91e471b4fc5be1e739b797fccab76bf20fbef341963370e92bb76ff5df435bccf8813f19ef919cc84206ba0b57c
-
Filesize
5KB
MD52b051a829ce2eaf89042a190c2104390
SHA1eacd817235a11b585ecf0d26f683978cdf7aa5e0
SHA25616fed3387cc838d061dc18ed4b2345db73ad787f6ba1457225e5c1936f6f25e1
SHA5122a34232d27eadcd876c35cdf83e9b4bdcb12f355c1870e52241be8d64e70fe2a810fddd3781f6cb32661bb7fa4d4bcc547230de81c35936313e95903a845d2b3
-
Filesize
6KB
MD5cf2882d45e5afb15d8b987e55a1a8f07
SHA18769a78bc087efe51c113f514068bb2de18d2051
SHA256318771513261046f16d36444fa6a50791f269a01021e5b61e150bc02c3245eaa
SHA512f216166b49c9d47d659e0b4c8b433b8b0cff35bba8f10d6c2ab5cee34d647101ff3a8fff051b109b7f51e917e9a519e7600b1a67c40a8855cd8e540be7676441
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54b96f2ea65bb3d87443fcc0b66327ca2
SHA1a1b1e57ed870316c09716dcf7dc9d1775bdd20d2
SHA256c7b2648f93cbdaee292c11b4db91ebc23ae8ce6492a7a3c5ce004649ffa668f1
SHA51279658ddf3aa72ec39ead748db475165768cba76094d34f0463210fc66856666b0f891efaf3bf453a82be067744b9d22802388c0d8054815cb4bd13f6578e4861