Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/01/2025, 14:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/files/17631111/Kox_Spoofer__LEAKED_.rar.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://www.upload.ee/files/17631111/Kox_Spoofer__LEAKED_.rar.html
Resource
win11-20241007-en
General
-
Target
https://www.upload.ee/files/17631111/Kox_Spoofer__LEAKED_.rar.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4920 msedge.exe 4920 msedge.exe 2120 identity_helper.exe 2120 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4188 4920 msedge.exe 77 PID 4920 wrote to memory of 4188 4920 msedge.exe 77 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 3504 4920 msedge.exe 78 PID 4920 wrote to memory of 4344 4920 msedge.exe 79 PID 4920 wrote to memory of 4344 4920 msedge.exe 79 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80 PID 4920 wrote to memory of 1252 4920 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.upload.ee/files/17631111/Kox_Spoofer__LEAKED_.rar.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeafa03cb8,0x7ffeafa03cc8,0x7ffeafa03cd82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1860 /prefetch:22⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12238555066412460010,6007599117647407756,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5df0757d1230177a621bec9cf36f17da1
SHA1652ff3cbf9238a7f1457ade0c1d8d413ddd69712
SHA2567ebca54478a3b419d19ef2975d0c383e80876df182d4ad11dabccf207a0a6d5f
SHA51216499d548f7391e3707eaee855fd48ba5c13910a02767ba28930b417973e83a74f3d6e57725c8b67aa6bc848099a38789370bc4b644d8d654a7fc084439d14ca
-
Filesize
2KB
MD54d7fdf2fedde4448d514c75ec0e649cf
SHA17222e9e8f01f317afb69416e0aea667ece14488b
SHA2569da62d5e421bf3c848973f93bf9ccef8b67c23b60d3773fcd410d4158b4be2ce
SHA5126c2e07b49ec5b054fbf946ef7a8cb7d29c0037a95cbdb9bc8688caf44bd70aed764ae717c134fe0d2d0a65762e87c46b87715b61f8272c0e795a266b086284eb
-
Filesize
5KB
MD579be86e70530a215ca0e65510927d09d
SHA1dbd785339d5036c800d3fc89fc559c4316aa3f47
SHA256b846da4278e43e44d9d3b0c49116d41872fccd7d547465e92f77971ecb7893a4
SHA512e078d959be8c45147f8b9dec53b053559689c6400ccb2b51ca2c3a40a6ba02bd59515b45e95b54fba2c73ac27998613167dfb56edc3d948a602e0ab2be431080
-
Filesize
6KB
MD5dc0c8a87b58ba63667b69199d2b34c1b
SHA1de3073b13a5d49c2a4647f73d009a6c4377d7105
SHA256739aecba30d5de4b3d609cd151200df1ba3f48d4e61e2ee74090530490ddd965
SHA512cedb05d24a67f6a4c2e7d5b6a284b1bcad17c422f0c69499de20d5c50a177e962f8768909787ae34c55e3dcb54abda4cb4a8c798db29cf38d46332953f0c1e54
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552fbef291b138a718debe4a58682a1f7
SHA1b5c5c6049869d83c0e7f24e02ced20ce5b3c4bd3
SHA256ba6d27602a8dd759124e381dd053408bf11ca3ebd7ddf769248bc225e02bc5fb
SHA5128f3468a226f48866b1655dc434b8c55657b315a342fa09407d49b18f1711d12dbdcbfded629bc170ddc72d4a0771aed44e562a645e826e6a8da8a1a327821c10