Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.box.com/s/35y9ev5dybgji2vb8xrluh8hv4lzkb5k
Resource
win10v2004-20241007-en
General
-
Target
https://app.box.com/s/35y9ev5dybgji2vb8xrluh8hv4lzkb5k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4492 msedge.exe 4492 msedge.exe 3080 identity_helper.exe 3080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4560 4492 msedge.exe 83 PID 4492 wrote to memory of 4560 4492 msedge.exe 83 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 860 4492 msedge.exe 84 PID 4492 wrote to memory of 4828 4492 msedge.exe 85 PID 4492 wrote to memory of 4828 4492 msedge.exe 85 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86 PID 4492 wrote to memory of 4244 4492 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app.box.com/s/35y9ev5dybgji2vb8xrluh8hv4lzkb5k1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb55646f8,0x7ffcb5564708,0x7ffcb55647182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16096537049175872614,11298301754525941730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2873b47d-e2e0-4fc4-8a24-f9b8286eed47.tmp
Filesize876B
MD5da7668784e2044f1a7c43a02f080c337
SHA13027498a7781788848df5a462aeaa5049d2d92c0
SHA25619c026f782f5cc301770351844cad319241eea82c5695cf7d05aa4c5ecb73748
SHA512346e8d6430a521aca6cb390bae6c4ef32a162a79d88c44ca732e455c5329dba68fa5b7e7392fb60e085070422e986d2f81c94e5f4baf54008b42507e607435c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD50d21ade06141e9a46172c7c8e07e08ab
SHA1b66e2c6a7f268ff0543bb425a67dbf9844fdb63a
SHA2560e920c9e8c1dcba4f5ae89dde2793426dce45d758a8e09f0a30c9caadb2e6f19
SHA5127b7e3d053d29a092f9fc803a78e2c76314856acd8b30f04c2783fdddd090dc0a78409513d89b1c83b64cbf256a44c6dd4629d66562d0f25e93b02339ab67b81f
-
Filesize
6KB
MD568bbda6487a18eaae5918d18b97dbbe3
SHA1e7a3fcb20b57282833002e2809b8d7b9b61d5b96
SHA25651850dc65321a1063a9a9e3b6d7b0f69d72c8065b2a75fe26902ec5478d9fe78
SHA51227e55bc9c7073deb151f417b28da9773f6880697f5ef63f988d237fb7b610622b8b2597051d5ec1c5e30e830e20cd021d79318dcde9236c4c173e01b080d7dc3
-
Filesize
6KB
MD5f469d1399172b1b240a038732bd533e4
SHA1e71ce084d7eee0ee636af415aef9188e33fb8e4e
SHA256d3a63d3ade668c12d1730f11470c7f898ccd8cc98209304f04aa775cbed4e74b
SHA5127e30377d7f36eebf49d698d94cf2c1d012bb501eb4b2667d562ebeafe26ef7e459ecb5f6f50f65ad06aca42d5bfcae469a91a5ef41aaa9ac3d6570189452fcc4
-
Filesize
6KB
MD5b6818b4a14d006aa64bc39003a07db46
SHA1af910922d8e423e990c7a38ca4e6611d7b10b893
SHA2565410a9077f132f0fbc123c59c88456f2aad79481473fa4922ec74c85cae5523c
SHA512f6f6535e77afb292def398eba750dfc19c215ef765e0269cae6ec00eb661e774f314f462d8b4a75e0d3567c565daf3be0ac7680ae7e17a407a5172b0b57b3f73
-
Filesize
1KB
MD53652d80681faebae1a70d4899f454a23
SHA1a1c97331a55ea52beda028f04b6fc9411a40295a
SHA2565a157f34a1d1be1167d36761316edea02e4687c104de51405f9c004ab6439c6a
SHA512ae5ee47f5ee0befb4337a3c77a6c25a8704d45c5e478cc58e21dfd5892c12a2e7072827e681ac4ce7b171dafc1f97a56d4a4d21d32df5c48f43114f8188af64f
-
Filesize
876B
MD5459a11b69b45d5826af123944c3cd25a
SHA18baac3c523e8520b0595341a9127afa416179d97
SHA256560847eedeae0a358d60916d1fa2ab315bd5075d9c4960af628c0938c6fced2b
SHA5126b0e9db4258e9a2144f3c71e39dddb4aa50b494f41fb34250b1f46bbabf531c8413732000de17287c28e9480c1022e253d4e544c245e967638bcfdc748c29906
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5da224b7c4d5193b07f5054c3e539481d
SHA12bcd595b54b365563ba629431d257aa109f51917
SHA2560a1bb22f4a7e257118e2a04f8db6c748f82de4c57523f018c3ebe2dd9fe98ac8
SHA5122c9f0db3ac19e6df2e3bffb6e62f3b4b55bae6c86471ec562342f939df6a99c015c7ff85a44d417428c61bac9ad6f814f0827763dbbcb5d1fb0283f28364e096