Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/02/2025, 01:53
250201-ca5gjasrgk 1031/01/2025, 18:29
250131-w48ktstlfv 1031/01/2025, 18:21
250131-wzcbtsvrdk 1024/01/2025, 17:54
250124-whbzqssjdk 324/01/2025, 17:41
250124-v9ts7azley 4Analysis
-
max time kernel
960s -
max time network
964s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/01/2025, 17:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win11-20241007-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 3032 msedge.exe 3032 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 1532 msedge.exe 1532 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 4520 3032 msedge.exe 78 PID 3032 wrote to memory of 4520 3032 msedge.exe 78 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2044 3032 msedge.exe 79 PID 3032 wrote to memory of 2816 3032 msedge.exe 80 PID 3032 wrote to memory of 2816 3032 msedge.exe 80 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81 PID 3032 wrote to memory of 3348 3032 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff70b83cb8,0x7fff70b83cc8,0x7fff70b83cd82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,11968057091950782402,10703669036235154538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1544690d41d950f9c1358068301cfb5
SHA1ae3ff81363fcbe33c419e49cabef61fb6837bffa
SHA25653d69c9cc3c8aaf2c8b58ea6a2aa47c49c9ec11167dd9414cd9f4192f9978724
SHA5121e4f1fe2877f4f947d33490e65898752488e48de34d61e197e4448127d6b1926888de80b62349d5a88b96140eed0a5b952ef4dd7ca318689f76e12630c9029da
-
Filesize
152B
MD59314124f4f0ad9f845a0d7906fd8dfd8
SHA10d4f67fb1a11453551514f230941bdd7ef95693c
SHA256cbd58fa358e4b1851c3da2d279023c29eba66fb4d438c6e87e7ce5169ffb910e
SHA51287b9060ca4942974bd8f95b8998df7b2702a3f4aba88c53b2e3423a532a75407070368f813a5bbc0251864b4eae47e015274a839999514386d23c8a526d05d85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ed34efa49fba283f23035bb7f4d151b8
SHA17d0036807553c271250857fd03582b2ced093e17
SHA256fdf34573e3046d600231ba9b7b440b425b3305011deeec216ec2d9033b1da444
SHA5129462407f596a28da019d93655fbe6836f12f56892859fa488812e4acdd699b4720d21a758784b4c94c9c7502f88f6453c00597aae7746ef31b8d37ae385d78e3
-
Filesize
595B
MD5916f5a3c8dbcb5dd6349c188d5667647
SHA167ea5c8b699e9d56e6c184d1df3bb5e49bc4d1ad
SHA25632484f070201e28e76e102ae8d18ab2c64c102a3b3df4de3de3247e0a0f5f4c8
SHA51253db787d58a83cf94f878013a7cfe58ffe5f8ec28edac2e81e63cf71c4739e1b8de6c3e83c5f7d94df7dedcdf5560a3a4b42131d52cc7480dfde9b6b2715d79a
-
Filesize
5KB
MD55219871fdf1c00bf4cac3372446068df
SHA17a00cd47d49db2784fdf9665fa6b6ad2538a7f6a
SHA25624510946522f6721bae40b321f399a2e970e2d46a036526391f9b36e79d4d042
SHA512460b68d3565698c1e2832a0c2048abc21d882cb4ba75472dfa1f2a7709449fdbecc470ad2dbd66e52aba2d30650d81087169e675e8bc00978229bc07c13dace7
-
Filesize
6KB
MD5f3c6fcce375d86fca62f4925aa61e8b4
SHA12a5628056a2cc180833be416d91c58d99a4d71b1
SHA2560b54563fef7df0376331a44cfd03c82d348e0f6d9a23797cc80f25b7f16bdc11
SHA512feb3f1b74d468bcb6dfda92e56b6777b1935e50626ed555d42aa91a829c84a9f8cbb4ace26d5b41e2b2c08feb64e26a2d1c8d5c2af690eee9d0cb4503c43310d
-
Filesize
1KB
MD58882823a409e5f3b8690d72a5f709a4b
SHA1c2bbc0b6ad73b0e75291e495a58dd076e177b06b
SHA2563d25bab0785d5f0c848bb8d3496703b9f06e77def3aaf24759297d77db9f8c0d
SHA51231b11fd0786b23b19c2fc79b611969b5cb95b684a5c6546848fe4e8e13f744f0b66e094c0eb21f8688ec89fcd559d545928a4e5878d906b6dd98f4089fddbfdd
-
Filesize
1KB
MD5175ca5197c4eeb91e371f6ca7a65c337
SHA12ed360c76f852d5238cafaf97ae3dccc62bb3ab1
SHA2562c77fb63235eb5fa9ce89aae3d8da09d386db453f3c40695ca3a1da49d2c4500
SHA51269c8d2ba1ef2cd30705ac8ffa3885db6320d1c372ef17cf65ea7f9ed255a2f3b3851472d69ca751197e0fc61064dd3b59e7fb13511a3a400647163e6e0557d70
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bd800feb9a3340a176acf44ed82fbb4e
SHA11ef642678cbc054b8a1674d2b4446a998089e037
SHA2560f4272450b228f22f6305772cba02d5232bc7b9b4c3daf6b33d4bde9cc21b914
SHA512e622ecc5976a726e42cfdf1254a458c084f53685e5b585effec061030e25bdc763d8618e1ded0da42fde18cf81513213cd9cdbd2350be303484ead74355aa37b