Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/10/2024, 01:15
241023-bmlphstemh 423/10/2024, 00:50
241023-a65q3asfkh 423/10/2024, 00:31
241023-at4y1asana 422/10/2024, 14:58
241022-schzba1apc 1022/10/2024, 12:40
241022-pwj4yavgmd 10Analysis
-
max time kernel
279s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 01:15
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 624 msedge.exe 624 msedge.exe 3868 msedge.exe 3868 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3260 3868 msedge.exe 84 PID 3868 wrote to memory of 3260 3868 msedge.exe 84 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 2560 3868 msedge.exe 86 PID 3868 wrote to memory of 624 3868 msedge.exe 87 PID 3868 wrote to memory of 624 3868 msedge.exe 87 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88 PID 3868 wrote to memory of 512 3868 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://holidaybunch.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9264246f8,0x7ff926424708,0x7ff9264247182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12166647123244151906,14150692354963248443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD54d2004c14d9550394a6cc4c3e69b5b16
SHA1d611fe703d5d9c9505b4ee7e08d05ef0d8db59ca
SHA2566491c7418056d20937c288a4d61c5ea394b5eb8e42ff58a79b717be2cf679d2c
SHA51246327de8dabc672b54d4073b6b20c5f658256f879ffc6acc192a1d172b0e626993fd834ac72c49f292522480c0bd752cc4426959ee267d9fa46038efac5cce42
-
Filesize
396B
MD529f637e190fef6120ff9eed5fc3f753a
SHA1ecad6ff0923d4da56aaa7638160b9708a71d23a1
SHA2563af3d9efabcf3fcc62dc37d35b8f4b94ff8ef80171e5ebb5e631341b84b9cf37
SHA512b8f4951d5858a8ddb301e6514c907b7067d425b7e23ef02bb5ef701f04609760b971c6669a0934c0b461cf3f2fb7280ea8d65c03b5c647ebffa7c5762b5ea653
-
Filesize
7KB
MD52f07b5d705fc24df05bf0ac8122eb5e7
SHA19844da4634264a81f6d992795d490ed2ca7e8d9d
SHA256bc6706b4a71d91f65a110c380a5569db40d744778b5d02558a9354406f4b41df
SHA512e9e7550b0b2591310a7f320bb8c4f9598cd2114fcb8327d70eb5b4fbdb6a37e0977f43622d10c594dd4f1b03624cce50d3d61b98c438e25a05ab8bfc8accaa8b
-
Filesize
7KB
MD5d258f938995b4f01292e7234cb6b9764
SHA16a2734033fad14f2408b5c85039802b22dba5527
SHA256466dbacdf6d90ee8a5c683c009ec6f5a3527120e7897dd0c23dd1d91d5a0d3a4
SHA512f800ed93ce6ca94f8e5f6732c8d3e35494ed39fd61c30b2f9f0e002d9aa519fb49e2e47f48a1a9c8e271cec40282210aaed610c6fdbd5ecc7b752556acffa562
-
Filesize
5KB
MD5d6f86b4d5fb5b1c0775d7c28481b8723
SHA1f8905e7f2e46440112f6a7f584a16b942b54c0a5
SHA25682a18a313d1cc70e919ccd2daad26082567ad525eb2481083d0a30fa2b3233e3
SHA5125809eab634f4fce68eec47fbb52180b8f130f408bf8e3f03e294c0bd1d899f48c6a7e4a6c0d903348a84a9b866deb99d7e1798158f849695397e99036888295d
-
Filesize
6KB
MD5f2bd2e11b558bfd1617aef954aeab655
SHA1557758603b02397f26f27c83ed038c0105e8cfc2
SHA25642b1e590e465e07b9a2b3b9d0fd76b3c474d91eed1a7d801f44741915ff3e806
SHA5129f1698390583ca234a74e4d2c9995f0059017e7ecf9c725977f5b7e5caba585a80776f6c8b784c1223227ca0763e4d78aaf12145423f205786b35883b90a7be4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD523986c6ff70245d8ded3c1e5207a3df7
SHA1ef32ba680ab696df8e43fcfc9f9af680218a4177
SHA256c9ab897fabc3251aabf9a4b13a2fa4d22960990fbc06b56a279f3451947d8863
SHA5125ee11db6e0a8c4d39d400c99ae520772300fed7c1200fc607e7a2de5a8e5c3e15db2f37763c026fe72729b211df7a6534771c1ca257e72d7aaf607563f721924
-
Filesize
11KB
MD5292eb22e7cea60485bedfbe6995bd6d3
SHA1e0af34a6eab2276775043d7caa1a2707f02eb401
SHA25632d8e0d6aa60a7bc95df9c1d41b6ed99cd01e845832217cf365a4f544879b695
SHA512c05c95d79dd8c610e0121b9f75ff96c502b29d04bc108bfb0b663bbcf7249e31d8737c4bbe5ab5ab825f2b0c837076780c4c7d56b287a7245fec44d7c4cefc53