Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 13:46 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://224.0.0.251:5353
Resource
win10v2004-20241007-en
General
-
Target
http://224.0.0.251:5353
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 5040 msedge.exe 5040 msedge.exe 3132 identity_helper.exe 3132 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1404 5040 msedge.exe 83 PID 5040 wrote to memory of 1404 5040 msedge.exe 83 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 1588 5040 msedge.exe 84 PID 5040 wrote to memory of 4716 5040 msedge.exe 85 PID 5040 wrote to memory of 4716 5040 msedge.exe 85 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86 PID 5040 wrote to memory of 3404 5040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://224.0.0.251:53531⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc41a46f8,0x7ffdc41a4708,0x7ffdc41a47182⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2096371427000802932,12308242257971951469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request73.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
6KB
MD591643e3e67f7ff32cfeec4fa4bf6b407
SHA11f76d69bf95f1136832ef9399d6110d6a7bd8d8e
SHA2565e0a71cccc118d3e2347d36c38e97784773a03c37cc75b0778275ebaab6ee6fb
SHA5124c8860e2ae3077f2b8ddc27445dd5e60bdca43ab62576040b335c79eefb38e1a5583852a34b2a919892ed98a039130929b0b91e668dbb02f95b5312053550059
-
Filesize
6KB
MD5812dbfe6c82e33505f3842d2c7ab4080
SHA190c413c83f97a1c6c96d73689e696322b5e5ae86
SHA2566df6b0e116421b4dad6a7eba01e1b02923837762ee210377469cbb1ca32deebc
SHA5125cc76fc16b8d592e74c3a5ac85f29455fdab9e1f2cac1cfff9cb1f30d3ba90914def59f1817878f20ea62a671195dc27422e84870a436a2c9c2904c1d63adf12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ad19bf88a1dc7d48caaab505bf70e8b
SHA143162280d35638c5cde81906bd0194c265c287af
SHA256d98977671d65ce046b687e52b47a30745a8d17c85ab40e373a831354b8512dbf
SHA512c758e857f936ab697aadd928622df2a631f8a11460ed1ca2b673b1bcaa28b06b2c9e11914ff2714e7d4cdf5154b11277830a40d3adbb617d3143964061d0c6c1