Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
390s -
max time network
365s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 17:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/MudVmQAI#9BQ-Bnt5gdqs7L4tij8jUw
Resource
win10v2004-20240802-en
General
-
Target
https://mega.nz/folder/MudVmQAI#9BQ-Bnt5gdqs7L4tij8jUw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 384 msedge.exe 384 msedge.exe 1456 identity_helper.exe 1456 identity_helper.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4984 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 4724 384 msedge.exe 82 PID 384 wrote to memory of 4724 384 msedge.exe 82 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4752 384 msedge.exe 83 PID 384 wrote to memory of 4828 384 msedge.exe 84 PID 384 wrote to memory of 4828 384 msedge.exe 84 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85 PID 384 wrote to memory of 3144 384 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/MudVmQAI#9BQ-Bnt5gdqs7L4tij8jUw1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e84246f8,0x7ff8e8424708,0x7ff8e84247182⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17176193989067158282,5846473333124447690,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x240 0x4141⤵
- Suspicious use of AdjustPrivilegeToken
PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58b8ac00245dab95b9a21cccf4d8f2d8b
SHA14c123df637a3268ee4c8712dff66fbdbdb619879
SHA2568836cad9faeda919ff80326dbb322046c85f82e50808f78b18236b71df59a6a4
SHA51214b783098a4bfdeaf2d231a6f8364675c8518bb0b713019dfbe3cc37720700d3ab6110f8a41b91f30d0ae0add23d979d8b4de505f64655da97f39f4888420a95
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
5KB
MD5e7872c904c57c344bef74d5d5f7020ba
SHA18a0a2ece1b03d9e1e5805c2557d2f256d09b734e
SHA2566287aa5aa2891c94dc19054ce446e0bf209c0be9fa67504226a845bf5f9ae227
SHA5122e07666f0a2c61f9f252536141061cfe40232399553d9f6a57e8d8023f087c4d7ef9c78aa60b81be71bf6dc6f4de87f2cfee65244f0ac52658409c4fd1190ad3
-
Filesize
6KB
MD5dbb4c2fec8bb679c0e84e19fc8923379
SHA188e557495eca825376a11e3dea9b07c64a86114a
SHA2568178262db244e5216ec8716475f62112062738bb2c0640ccefc2434184f6206f
SHA5127afde422f6d488d11d6716ea9f595496de3ff744003b1baed87570d0ddbe9eec1703e927dfdd66c08d66cd926ff9ef42c9258ac8a9abca0f4e13c62e920fe46d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD503ea0c9dcad9467932249cd977357b2e
SHA1a2f069da03e0f6e2e4f780ef74151a1431b031e1
SHA256938efb199439d992bc8ee5094f0fc914b016e31e065b53a0a1ed40daee0bd216
SHA512b81bb8a975964d97bd7e323eb7464560ff180b469d25e0a8597e315d1d13d065e4f32269b2ae6484edf98566dabd3a468de21cd0c4c4c13ba0e8db40bd0d53dd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ff20.TMP
Filesize48B
MD592a6c094eeaafaf99d66a59b6ca07949
SHA182897abb9269ca4314171a7dbd0b7d8697901c32
SHA2568021d6340eb9e4183cb2f185ffdde01472e8bd34a32b133e83859889a4deacad
SHA512cc5efb3be83d98926fe334e8de7b2c1758d0d78df5475e2417a3e5b72066d6f7f03f42eb02366912b7ccb9be31ef429c223802143af4152e231594a95fcf69f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51e731fb0ea068e502317817e68d527bd
SHA128ec24865d32e449d5a2f2cd64b84c21353c2da3
SHA2560b49b3d0626e246ffebbfcd0f25f7af19467629997762067533f143cd72a084b
SHA5125ed26351bc4f4dc63398b3a3f2d9b63f79487ada4baa46c77ba01177ef3779584ba731a2e07c88f910f2880020a4850eec879b8c7070c2dbe5ff1add6f8e966a