Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/01/2025, 15:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://is.gd/2QHRmC
Resource
win11-20241007-en
General
-
Target
https://is.gd/2QHRmC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 964 msedge.exe 964 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1928 1072 msedge.exe 78 PID 1072 wrote to memory of 1928 1072 msedge.exe 78 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 1056 1072 msedge.exe 79 PID 1072 wrote to memory of 964 1072 msedge.exe 80 PID 1072 wrote to memory of 964 1072 msedge.exe 80 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81 PID 1072 wrote to memory of 4044 1072 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/2QHRmC1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc67443cb8,0x7ffc67443cc8,0x7ffc67443cd82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10657149522820549683,9345890768781269047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
Filesize
5KB
MD54aa175f604af50846acf71bb0c8eeda7
SHA14a95fbf28c62a51004bf118a0e5cf88fea8f675e
SHA256db3f11ba7a800249265d6a0b4afde21c427234650df30a129cc4dfd12dc1acc9
SHA512bc2f7588bab00b732309062afc149af0599cec37e0d59f6cb01dc54b0a242bc6af18e5d928d4c9c8e78402e8306f83c5e96baee3c9742550c43d268a1372054b
-
Filesize
6KB
MD57cefe1b271197efa64722dd8839639d7
SHA1f9341e8d6c3f8c416ade608a896b2119ed1ef8e5
SHA2565b22a096332ce413ced4cd6cf288ea1af37fac21cc7bff49e214f11f027d0f34
SHA512c4d2ff262311b917038fe53a18e90d3bf55b0d56ab9d0c0d18659cb88f5a225b7b8fe16d67b4ecc7f00f0ea985fb311ec712ac4e6b460734a9c0ad811b3b1baa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD580aef7930f17c40d5a45de34b31174cf
SHA1a75a8369675d22fff5a0985782567918ffe333a5
SHA2560c968786992e39dea62823353f613ae5c55cb0ac320b7cd94d894e0a578530a1
SHA512e8f1fae6d2869d689a93402ced0905044c961882a5bff4820a0f5646ec7f551078bb891f25e8be6d7770c235dc0971e7ec9d5e0e9447922ce7516fcc9d0936e0