Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 13:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1JPG4OARQeZXbnxy39bM53G9nxzSJPB4p/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1JPG4OARQeZXbnxy39bM53G9nxzSJPB4p/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 10 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2800 msedge.exe 2800 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1296 2800 msedge.exe 83 PID 2800 wrote to memory of 1296 2800 msedge.exe 83 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 3764 2800 msedge.exe 84 PID 2800 wrote to memory of 2748 2800 msedge.exe 85 PID 2800 wrote to memory of 2748 2800 msedge.exe 85 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86 PID 2800 wrote to memory of 2280 2800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1JPG4OARQeZXbnxy39bM53G9nxzSJPB4p/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d4646f8,0x7ff87d464708,0x7ff87d4647182⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2254533971023987357,8443257495241158581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD54f779cc3e5042b52187982bf27ae2756
SHA1e58c955233dc41a6cb811497be80616c506b92a1
SHA25676fc1e63432aa171ed6a452eb0324b0eb48df029dbd49f764446a76ecf4754fe
SHA512ecc742568085a75f718d412409afdda29e43a6b8e83efeeec47c715710657000183b6b02cfb19870049caf53c005f9f110782088bd709eb73275e2a05cb7d503
-
Filesize
3KB
MD5457e63aa28b6b1fb79da4c8dcfc55b13
SHA1afde5924dc2b4d7af4ea7b964f5af86e040af17d
SHA256eaec19e5e51d47493f8d7797c864f05ce2af0b975cd12523767ee306b57e4c9a
SHA5125eb6f74ccb3318ddaeb7f9e7a5e1bedcbdbae7197b547c453541c4ddd76591f62e6b09c1bbba25a7f1b5e78ecb11e6cd3898ccd73faf6ef5a5447175d46460dd
-
Filesize
3KB
MD58a5f3e4cb0f91a2aee2fc3477e4ccbf6
SHA1650d63d9b5d992a05154ef511f3056e134e97592
SHA2569cbe5bb4728582d34acd5a9327c4e457b102bfe470adcd7189afe2c2cc9ba88b
SHA5123d179b78b274f1d59b1c4595464862363a548083b23e1c25161b3cc5e6f020841eddc6148406bb97da85cb6e058a291412244f145eb78e08153f92f981849f3f
-
Filesize
5KB
MD508a379ea8c368ffc3d45584170e66427
SHA152be66b9f67893704bfe2041a8cddadfdf8bbd11
SHA2566ed9110cafe0bb5f996c66022ec90904f5ad1a1d2b381b240dcefc5392b428db
SHA512f72ddaaa92d6460aca21ae3216b143138fbc3a0302d3e3c392896d3a50f82a96eedc45533ae0f914089d63816ff412c82ff4eeb699d42a66b8e3a52de3accf8e
-
Filesize
6KB
MD542f965d54c5a80926e78c6de51211cc8
SHA1850b3f6dcc041409c6f33fd0e7d7d0a7593eddb9
SHA256405b96a9f34010db5dfe134c8de3448c01a42cd48950aa8d8b6244d353bde6bb
SHA512772bd028844f84a0807370328a310e3305c5e9473e82fe7f9d9a8d9c054dcd3f77c7f1c45785bfca70fdd2250ab29c18ddfc4a601fc49cf26f67fea0af3960b9
-
Filesize
1KB
MD55e4fa2bddbbd9042a519f100d16fd6a1
SHA15a81165fbcabe57df796947fa4b2cf2ae058bbf4
SHA256be26f05c6abebe92e45b847394157c9a9e91ef08ba708038badf46ec6e835c2f
SHA5127d420c07f286a759fa98f10acfb2ee42aaa2492a65195ec57810dd240c44822ad8fdb7cf238eb959ea9f669c87827b04b226ef2f82a08a64a0798886e5d3263d
-
Filesize
1KB
MD5e9ffe90a07b45ebba3656cfbeb346287
SHA169cdee8e6b57a46986a01c3b7a6de6f09e53173b
SHA25656ca283b2bc0894b19c02f81eebe64068a345d160c2709655070188e69d1b700
SHA512dfe5dd8315028cd3511acfe942ba67fac7535b2eadbcb0e82ca8e8125e09ecc3779d3613156f2ff4913537e7eec7caad9854c5b3c7217152ce35345bd52541ea
-
Filesize
1KB
MD5fa8bd6f01f11b9070ece3950500336fe
SHA1840dd996f99700df58f3e124ead06b502e99767a
SHA256c798402ded4ef3a63256dfb5acb8ce3e4e1d17764b0fee3807d841dc30c7d214
SHA5127c07022272b6328c861f67ad3c23003a5d9017db684a1a35713a03c219ce68468f6bc42ea9c5e2b8f12030bf4004c42bbef85528ed8a552b200f8fc12ab4dd50
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5e552cd714f0fcd816c20d1a9ea1518ef
SHA185b7305170f9b23823f9602ffa4e99179c00f842
SHA256aa95abbfd1258ac81a37048a014994456d62a1b945b4f2b55d3844e56cb27714
SHA5129142476fa2192915a7bb8887cfcf1ad333c98718f04eca2eea231c2fb8806e2d15a0c8c343421f9f6729a3f413ed62d8bcfa7aafda09e06cc93242f925a16b8c