Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2025, 17:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1JlR3XcWdAwgoGtA-UuCDRSDqltr9KjEn/view?usp=drivesdk
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1JlR3XcWdAwgoGtA-UuCDRSDqltr9KjEn/view?usp=drivesdk
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 1316 msedge.exe 1316 msedge.exe 3292 identity_helper.exe 3292 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4232 1316 msedge.exe 83 PID 1316 wrote to memory of 4232 1316 msedge.exe 83 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 3996 1316 msedge.exe 84 PID 1316 wrote to memory of 5096 1316 msedge.exe 85 PID 1316 wrote to memory of 5096 1316 msedge.exe 85 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86 PID 1316 wrote to memory of 4636 1316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1JlR3XcWdAwgoGtA-UuCDRSDqltr9KjEn/view?usp=drivesdk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc825846f8,0x7ffc82584708,0x7ffc825847182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9089128133361154565,13110572096304163018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD55afe5aff2ffdb6a9438d2c39e103d9a4
SHA1b6c0f1497173acde3dc7636002ef6d218596f50d
SHA2562144a8118b8c2338522b6dda1d785109b15b489e5125271a4a6fbea7f3414346
SHA51253eaf815384ae979716f1b67054a92fbd254bf80bf4bee16f4b82a7e666470bf71fb4fa5d3169d92cd5052fc6744835082ded13512e69566df1770490906ffd5
-
Filesize
6KB
MD5b817e1072f170c13da4c7a21aabbaaff
SHA1c578d4b2eaa94db62dcbd15fdb6a7585d602c88e
SHA256873d70c160111ebe220806e6ef116c06e8b1fe8f36d3e8b5b7601db6a4f691ab
SHA512c65d080d1041e2c082bef29c8ef7574acd8f9469218d70e1e0a1585de7f63d617b72ab5caa2d2f1bc7cf147f5d676c9cf81af3f557184a390dfd447a611046a7
-
Filesize
5KB
MD596bc6fb9cee564412c73f36e128f6ee2
SHA1d0b44de65329366cb9ac5c98a50d670191c71def
SHA256614c506e808931e444f096e43658466078ae471c9d9e6b7f8237e9aadd670aca
SHA5124ecd42447ec376ea58f880afb0f9e10224095a60b444aba0742807466f7e43b5fc156daa700f4c3d63ffab216b42ba2fbd2531b9e59746be464fed49faa37f2c
-
Filesize
1KB
MD5e7dffc994ba2be397324699c56b15eb0
SHA1f15ab86c241928eed047a21adf454a3599caca0e
SHA256a608c3ce97f622537ca9b80272244a9a0630cf9e3a10a251923a23473011ec4f
SHA512a0c690caaccc1265c809489e96104b3e772d4d771feb5e5b1a1d867c84e01a4345ec4d46f7389c36c1c4f1688bbe680f02b6b3f44fd6e7174c4607531fcaaf8c
-
Filesize
1KB
MD5a60b939dec9521e8901852b6fc7d2485
SHA1e3972305d82f7194b3dc4d38445f17911c3754ca
SHA256b2cb37e529e7d56777f9a5b599102ec33b5ba641fe7da319cbb3b241d771cd56
SHA512282261a2898c2a1ce4d5c975a5190f8b0fda3983a984da342387e35e801742a6a4f4311dde62c0f1c358a0e4afc3367efc6bed3c9ed9a1924d3db18683dd5632
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d5abbe29cf52cf357b1393f6f5b3e2a9
SHA1eb264ebb5058cb36f07097974a7c91d85f9f304c
SHA2567dab292ae85ba390b0d4c2276af12b77e593ec25af22c3a806339ac0cad25c85
SHA512846150cd76e26aaff9016d3e7c44d54ba30b80b4fcaba313793fb7facfebcb8afc0eae9b50cc82cf28a868fcbf69ab36f85e2808ee600c494a2b17a557b0d72d