Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 02:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/fabianishere/udm-kernel/blob/master/arch/arm64/configs/alpine_v2_defconfig
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/fabianishere/udm-kernel/blob/master/arch/arm64/configs/alpine_v2_defconfig
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 4960 msedge.exe 4960 msedge.exe 2792 identity_helper.exe 2792 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4556 4960 msedge.exe 85 PID 4960 wrote to memory of 4556 4960 msedge.exe 85 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 2804 4960 msedge.exe 86 PID 4960 wrote to memory of 1160 4960 msedge.exe 87 PID 4960 wrote to memory of 1160 4960 msedge.exe 87 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88 PID 4960 wrote to memory of 552 4960 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/fabianishere/udm-kernel/blob/master/arch/arm64/configs/alpine_v2_defconfig1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffb6ae446f8,0x7ffb6ae44708,0x7ffb6ae447182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5230313950497016084,4911934610607163057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD544530751acdcf8783d38005c529a64cd
SHA188fde13506cb43880af60ef8559adbd1213fbdb9
SHA256b847a5114fdce2c1299156899cc1a78b5e94c31d76f1c43684560cc62d1fc56f
SHA51290fa04959e29f6e0b4ea1151b0a990855c4d7249b9191c1a43b7b054897cfb7af8085f7741f816f4118d9f82846f80b6a08447798c693e1d59dc566364569bec
-
Filesize
496B
MD5c4897aa78d9edac4710b6abd9081210d
SHA182fff6d6a6c64af2e1e64a0a56c46cfc2a3470bf
SHA2561c2dbad9b7fe623f7907fe8875ae1df241de6ea09e8dbb063b885983420fc005
SHA512207439940f16c3a029f465c4f4b6d290f15deea00c5d46365d2bbe5a27c48371315a7a5e39366638a4d256c843470b6e9acd6fc7c0b85aac10dde6176aba026c
-
Filesize
6KB
MD54e666a13e7d25335dd8969198bf325c1
SHA1d89dc3b94b76370f29d027096a5de9483561f325
SHA2561168ecd926b3bf75365d5d8ec4b97874c91b7a341ac5a5aaae2b955febc25d1b
SHA51214b3d4c347571b69252e3cb723db1b9ea9583d3375fc4e599020dd0b4b0d79fadf8b6fb77ddf08066b7f508977c2f5073c7cc83c9d27a7c6375d9f2222f134c4
-
Filesize
6KB
MD54cda83c1e955e62854819cb62d84225a
SHA15fc69199c7baf165dd05915bf8b33513685feb19
SHA2560e5a2152b61590a6d31cea4866b40504c79df104d419119bce4d851ec7e201b1
SHA5124584fe5fc13d33984f9680461ab4bd850ad904412ab8aa7da3b9c541a1deb9edb517d7f2d0c611322b6183e4c2f090b8eb667aced4653fcf1f0f7a2644e2a71a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f32328287960626dbcf96c545675a06a
SHA1a9f56c3d6cfe7be6478c47aa7eb269b14cd44faa
SHA256f1fef162e309a4113d36e804efa44f6ebce7044eea530fd360c8d305b1572996
SHA512174e9d20390d566fb1294da565d9857dc4d2b7d0c3f55dfd47a70888a8e1dff8bb8318895ee628af306aea56f3d7bf54b0f6e06c4067554e4db9752b962ca6a1