Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/12/2024, 16:08
241219-tlpnwsvnew 717/12/2024, 17:08
241217-vnneaatjc1 717/12/2024, 16:44
241217-t85zdssqhv 717/12/2024, 16:44
241217-t81dxatpgk 717/12/2024, 16:43
241217-t8rf1atpfr 717/12/2024, 16:23
241217-tv5fpstngn 8Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2024, 17:08
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 discord.com 15 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2444 msedge.exe 2444 msedge.exe 2844 identity_helper.exe 2844 identity_helper.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4200 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4200 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2896 2444 msedge.exe 83 PID 2444 wrote to memory of 2896 2444 msedge.exe 83 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 4320 2444 msedge.exe 84 PID 2444 wrote to memory of 2420 2444 msedge.exe 85 PID 2444 wrote to memory of 2420 2444 msedge.exe 85 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86 PID 2444 wrote to memory of 4536 2444 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://discord.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc69e246f8,0x7ffc69e24708,0x7ffc69e247182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,15685549513915173879,15319794680919726082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x3f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5cab3ec5d4166d136104ce96cce94449c
SHA1b079d0ccc999b53d42aafb8b73952d8794ad4983
SHA2561bc91e8b2aee0be9d1285aa1f0455db7d308f6ecedafd0a2d37d0cec20b8ae79
SHA512dd90915a940fab218ffc0c27733176f18de786c49e5fdc068ac1ad03befc8061c89c547943913a0fd66c67d874f2426ccfe3fa11a5d81c7bcddc6e2428cf663d
-
Filesize
1KB
MD5e9ed53fdf2b10ccfdbeebb14ecae6665
SHA1daf06a3608826248ef85de0f1a462c1e70b5fb89
SHA2562220d18eef2e9255ae6143f385d222a3ba1656fc7ba6ab4e3fa98c2d35919bad
SHA5120c27b69135ed838946fc41e912f8b7ba6ce003daa340e221bde3bcf61cad643134b4ef2bb7f39ab0ecf4c3424161ce67cdb59ef636261e52d220dfbfac08f12d
-
Filesize
5KB
MD5151402f51b3f50e5499e91fcbb2588ac
SHA1415aefae80b39b4cdded0bc344f23e0ea7a7a57f
SHA256db05c4eaba7b4a27632437fd747a3482f2ace9c866e00df7c679ec124604e399
SHA51208296c76d080e0384c5d69d23e8b2452a60644266bc5388667ee43731616536f69aa8e4381e01bc756d88d2d50c528b02b79c5b7c2f50a06c8d7c4f361f1d798
-
Filesize
6KB
MD57adca1098b370172c15081abcb96a8d2
SHA135252e69c2eb1841eb2cbd8995d9cd29a6b47f95
SHA25694688b4ae5c625906a78b4a389a31c90889f5e5ce50e7b087e1fdc0e4be77ded
SHA512a48a374692797959a6fdecce79bdf6f3bc5476ba5c3ea6ef7f35e27a8426d4f97a264d4f3dafa2320fdfe45509f07cd878924ef6df89b58712155c4ae9a0d6cc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f420b392c152e796b3ee3bc9929788d1
SHA1b8bf5d3b242181966b923ed0809ae7297a2ae1bb
SHA2560b2fe9fa8a0893081a509e1bce3848e3f4585fc0523f7246245be2b308aa09be
SHA512b0b0f95487fa9fb7075cc16303a9c893333570f4a51a1afcbd35b286db703e21404c7bce35cb6516e2eba7f60663465da7638119aed1c568640bd88e0963783b