Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/12/2024, 13:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/us/security/learn?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&calc=f3851924fccf1&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=security_learn
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
https://www.paypal.com/us/security/learn?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&calc=f3851924fccf1&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=security_learn
Resource
win11-20241007-en
General
-
Target
https://www.paypal.com/us/security/learn?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&calc=f3851924fccf1&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=security_learn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 972 msedge.exe 972 msedge.exe 2312 msedge.exe 2312 msedge.exe 468 identity_helper.exe 468 identity_helper.exe 1548 msedge.exe 1548 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2036 2312 msedge.exe 77 PID 2312 wrote to memory of 2036 2312 msedge.exe 77 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 4184 2312 msedge.exe 78 PID 2312 wrote to memory of 972 2312 msedge.exe 79 PID 2312 wrote to memory of 972 2312 msedge.exe 79 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80 PID 2312 wrote to memory of 1984 2312 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.paypal.com/us/security/learn?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=020cd31e-b0c7-11ef-bb4e-11182ba28c16&calc=f3851924fccf1&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.294.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=security_learn1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffa7493cb8,0x7fffa7493cc8,0x7fffa7493cd82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,5996414052003468434,16372260692322215153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5dc5eee9e8f236affeedf597a7fdd759d
SHA1e18d60f0fdc039dd05bbedeb18b09717bec0173d
SHA256ec63eb8110738df2fbc124586d3a6045a89e08d334644c4a5ea4e1646e334e3a
SHA51255de40480e16569aedfcab65dfd949c59c44d64c6cf692ed430c3ccd644466e155065377584443bd3af3c243418895c373f59799a0aa58d1a377c40370b89637
-
Filesize
1KB
MD5c931fe027b83b9f0ff379123991c4700
SHA1211955134126b0a450183869542aeb075c48e88d
SHA256c3cef91cd06d2b6f3b81ac7f6220ff68cb720891913fdebee48add495b60fda4
SHA5121c4d58578141ea127f5b72b0e731fca623c3e23709749b6bc1c6413cb473a74f21638d0a43e5bdac35db4d224df9e1751465d278dc6e6c784d32336aa4196c79
-
Filesize
5KB
MD58d462a94a2899b08d2bb7d709628fc4b
SHA19b7f0dbc81c26dd91f8dc27881e1cfdd7a76042b
SHA256b17d61f28cf8899fbb40cea3c54adee5192f47b3e9f956e67e46e295897c12e9
SHA512b617c021f199b998e99bf4d20dd6cb5e5e49be1ecde19dacaa0ae3ec123d037b796936f27b18723287de8088d42f8ce867b7a8f6f5f747f1f6b974c24e6f714b
-
Filesize
6KB
MD566130172b31a3a3a41b1a31c1aa5d099
SHA118277fed17a7c443d8fdf95dc410452dff0f4d38
SHA256e592183830348a7b2f75f45d59d5227184ef29b1caab72a3f7dfdf02ae155e4b
SHA512bb398da1ce6be4d613ddc47511311cbbc187cea49c59520e8d42ffc4d47303313db39196e780d2390c4a536dac3b77dfc98ef07a501e1d65acce745bc611823c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD546f885f7f8827e19aad269c3f4fa248d
SHA1d088b2e0498d867d0ec1d06ef314316be4500513
SHA256e3b5cfc4475291dc4574b617dc1bd4e179574e7cb47dd696acdf522db0f80bb9
SHA512cab9de71c53e1efdb0e52a7912ac9333627554e3c2ac58942431c8a527d250bb5af200a487248def0a4193b8e13c1e1c05c44c7062eb318a5dd85a7b40c80373