Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 17:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sharevault.cloud/LDFEAD
Resource
win10v2004-20241007-en
General
-
Target
https://sharevault.cloud/LDFEAD
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 discord.com 35 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4089630652-1596403869-279772308-1000\{A2925122-EC04-406A-920A-1D59B60B152B} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 3600 msedge.exe 3600 msedge.exe 3916 msedge.exe 3916 msedge.exe 808 identity_helper.exe 808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4972 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3428 3600 msedge.exe 83 PID 3600 wrote to memory of 3428 3600 msedge.exe 83 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4624 3600 msedge.exe 84 PID 3600 wrote to memory of 4812 3600 msedge.exe 85 PID 3600 wrote to memory of 4812 3600 msedge.exe 85 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86 PID 3600 wrote to memory of 1548 3600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sharevault.cloud/LDFEAD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87b2a46f8,0x7ff87b2a4708,0x7ff87b2a47182⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3372 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1972 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14399332348805844170,14165669455166025127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x46c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5ba5855d68f5a2bbcacba7e97dc978ea1
SHA1ffdf1ad61f0c9c1e4f42894b011b745d8d821ca9
SHA25698a257805086176c8bb9aaa6240424daccf1e5ca9aaee2d4f209d8264e05e35d
SHA51240464aa001dbee9709748c3a2626d02b34fa71ed4e7221c1029b23427cdc85397aeaef3b7e9ad97c8c129998430eb71f78ebe3d8dbcaaba9b02e0a8036908d6c
-
Filesize
6KB
MD549390b159bc8f70db9f52a786d593602
SHA11f485b22778f2c86eeb67553d7ef8eacc0968d40
SHA256a1fbd555d7c63ccb5732034e79e68037310176e5f4dd33ebb676cc30902b4190
SHA5127da1afaa6981af3552add5a7cf3d74a72f58bea7bc00c9b953323c2bd141ebc510a247e5da256622b7218b03384c35c28d886c044352ee1922b9048b0d8078c4
-
Filesize
6KB
MD5315a1e164db40149c3e55c1f68103b0a
SHA1fc756267348231adb8701f478e414e70b45396dc
SHA2561d09095609841270511acbf484a3983d004e4761b61575f375ecce89e8d71605
SHA5127ea57a144f3792f11508b79d0612c5ca0094ccc5b759067679486858bb16bbafb764bea732f350d093163035911c80b771f9a9e4dd36201820cc2b103327e052
-
Filesize
6KB
MD5f6450e8b54ccdda2b98ff13b7afbed36
SHA1335cc8a141d0600ce072449d0da0f9c6ca3c6f0e
SHA25658b095c207451ff11d34ce33c4776d67751b7bc167b0cff05b4e5ac4a5e025a5
SHA512d081b0807f6d29ae303cdb6391681f8c4ce7b6301cc006edd60bf8370fbef5b1bbd2a6fcad8688d07551ebe5d44d669922d907434e2cff65b92649bcf9ae9fd8
-
Filesize
1KB
MD5a405e88c53515ac56d895ce3f5434545
SHA1057d13ff884ce4d88c2390d0697ff265631cebe2
SHA256b2e9f5c5d8f81aa2f1c39667659361506682073c0f99f3238a95be0a7e65ec99
SHA5124a56f9d3b1dc36f3eb82dd6e5d44e672f5a06dd08ffea1587ed38c602dc9316b0c1c0635d9fc0b1b3f92da45df7c39c7c5c78b851bfc38012650e01db86b570f
-
Filesize
1KB
MD55497fe595ba8fba288aa189d0403b9ed
SHA1313af113e3d8d8f6486e4dc2bcf9f58acc226b5e
SHA2561ed20a350f3a4c6ba82ef34910c8e67654a76f1b11c71766195f76321743f264
SHA512166362c93d5e810b74ebfbab8522b6c4f916f2e81d21ab67b560845ea6b876f063d1d295a2e8e72e0d947cb8aefc17255a5020b9a071a452576532683dbb073c
-
Filesize
370B
MD5e9af2f775eec308ea4788dc99c4920ed
SHA127afec10e38586cc347654c3b524db03eef02a6c
SHA256770209972f369190bd1326f8d21b959b370153f17afa29a82e538572b793fc74
SHA512778030dcdd7b2d6e33ff0de9a95180b9ba849d44187cd31c73dab9d31d4b2d4b4333d4bc2353e243fb9d25f01516d1094eb50a06758939145ae63215218a083a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e2381d65-87e0-4dc3-9e10-cf12ce00b5c7.tmp
Filesize1KB
MD555508a7e58f3dd2b8df59bf20ad611a1
SHA1a294c5ac365a8ac7e116e5dbf70e24ec347ce855
SHA2567b43a6681203adfe8f63204a0947fff82918299502811af96abb8eb3b0770f92
SHA512394773ffcf035c166ce5b233d2910bc02bf93c015e9f1ef15203cbb161d9adede8a7ab2c88fe8797585c42fa724f431a7fd952cf0f367cb3cbe4597498f96d8b
-
Filesize
10KB
MD5c343b90e769d216594339697c79b3dbf
SHA10cde59002f969403f94ab2ddde3a10a55301f878
SHA25645be9aac5df3ed12d0af0b609326b8ef4bc8f58ca58659160592ca4d24e329b3
SHA512d3222a400ae81fc02d68cbabb10cb45c025d289e8d46cc29e0e653a0413825e4b0e066b915cc4c1a33ea08c5c3d66ec818fb9b186cf6743f5cc4613baf5099cc