Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 13:30
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
flow pid Process 33 2448 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 1412 msedge.exe 1412 msedge.exe 2232 identity_helper.exe 2232 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1120 1412 msedge.exe 85 PID 1412 wrote to memory of 1120 1412 msedge.exe 85 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 3744 1412 msedge.exe 86 PID 1412 wrote to memory of 2448 1412 msedge.exe 87 PID 1412 wrote to memory of 2448 1412 msedge.exe 87 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88 PID 1412 wrote to memory of 632 1412 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stemscommunity.com/activation/id=156152385731⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe262f46f8,0x7ffe262f4708,0x7ffe262f47182⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,14755534018929004000,14835377469810080086,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD572d61524e75c30f8d06966cb2f3a64f2
SHA12de04a2ab775ce89b9ebc483e11128594ef0d403
SHA256dd48d35ff6f10f86178c0f6079215be35f6523d28234bfd779074a7e7da01e34
SHA5127b728ea876fe3a795d4321ff30745bc4d155924e1548bcee15ed55cf5c125bc8cd3d745d408953d4a0d8416f0500cbe06f00b76d45ccf8530d9f51dc8ed93c79
-
Filesize
870B
MD5be08cec2a37ff2cbfa2c09dfdcb83e41
SHA13d6da3fbd56484dbde64eb6c8ba6a68d45f3ad69
SHA256c2a18fe2cbc4fb9a6d6637e66fda60ecb602992d1f028484c901ff9319065fde
SHA512ca59969d34c6a48338661faa291dff5c08b4f442771ad9c425ce59eea662cb8f3739fdb0ea31e1d94e98c06dc65770b66ecef2fc58d0db52900a6598f1212bb7
-
Filesize
5KB
MD5da60ddbfbf413e1860804bd50e99494c
SHA14a58cde54af01de885b2def0faeab2f356eac640
SHA2565d43b78528ced2f93952b804dc8601a0377d9420de85caee640551fd0d2264b5
SHA5125851e2e4fc62de282bc1aaee33fb577db95f4fefea2b109a038b359df4aeaf16e2e7582c376153ae4b3121d4e828e30428e7103c06d1573521c4aa6e09e28232
-
Filesize
6KB
MD58e0a923bad1ea2d5451891660f306bde
SHA1f5f18c1d736245ca0c8bbdb84b9ef3cf9b19686c
SHA256ae8715a3c5d9cbc4c89e4831868c0b03264e215483e85ae663788a780c38609a
SHA512d722b559cdcb4232bb70c09306eba6af57968ddf5ff0e2da0120b2a29defe4a1b862f77761f5c7a32ec42bff60247f724054cfc2e0ba07e49c0a67421fc73ded
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50ef11e0ea410518dc1b96f0d16583161
SHA126ecfd42d1ba0f21229c5974f43552d36645088c
SHA2564f0b2c430aea82828063ce9dbfe3201b2478bb3f0cf2ee1e6d57d382f27022f5
SHA512e3d3dd3f712e3e60055f63fc4f682555e7d83f23afbfab4f6d961883b7d1d0799f7f89ea976f72d2a8c6b62a57c5b9c945300d67f91cc79e22f9c9b940eb19ff