Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/01/2025, 05:52
250129-gk27davrhn 628/01/2025, 20:00
250128-yqyjtazmey 628/01/2025, 19:57
250128-ypnm8asqcl 628/01/2025, 19:52
250128-yltp3aspdj 10Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 05:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/limiteci/WannaCry
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/limiteci/WannaCry
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 37 camo.githubusercontent.com 38 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 5036 msedge.exe 5036 msedge.exe 3212 identity_helper.exe 3212 identity_helper.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3048 5036 msedge.exe 83 PID 5036 wrote to memory of 3048 5036 msedge.exe 83 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 1620 5036 msedge.exe 84 PID 5036 wrote to memory of 2492 5036 msedge.exe 85 PID 5036 wrote to memory of 2492 5036 msedge.exe 85 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86 PID 5036 wrote to memory of 2108 5036 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/limiteci/WannaCry1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4e6546f8,0x7ffe4e654708,0x7ffe4e6547182⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13919706911406765330,10406570093286149140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\39fb9646-5206-45ee-b061-88ad29e7f14b.tmp
Filesize5KB
MD5ede1fcf698cee605ad4282d0939c02ba
SHA19498538a778b80c35302a185dbea1e0bac69e673
SHA25643162e611f1e73108a40bfeca36d497979118f84ad6ea1458fce166b57d88215
SHA512e0a9b3eb6990e39c456a3a9c862cb9e8127207023ec043cbc0a180f650374a0b472cd3d2363781924e8a8c53a08a1007ed3a56f7b784b2435949b1297d48b1e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD556e06c999754e4dc1fb87f41d8458da1
SHA17de496d5d37cc95f271f2e4e3ee2a25cc8300e92
SHA2568764d730af120c9fe0e9e01f4de15ec6cf56961a03f87e91c0b322f996be7d70
SHA5122db2a96767417e5387a8e21b9390361d09f18429cfa40d0bd9461e41460ef2e3e6917430704272e9524a8428af59f79fe445a3ed7820365d8140a2fcaddbd0d9
-
Filesize
580B
MD5d4305c3993d0f27893ca3069f2c3cd3b
SHA14be9d9cacd91df869880b95b5e6ed81f0cac56e7
SHA2563f84ca13bbde91f446495ebe7e7ce116607704bfc4aca4284fb7c27a882f4be0
SHA5127b31c706bcc1bf7a41da090e0eeba4bfb930b948dbb84896a27cbc9657ae5821cf9d125e8ec54967e3eaaa0ed6cf485f708a15379ecfdfaa8fd084e4d7d357a8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a3a84ffa2f3a8382af8569ac1e430672
SHA15b5bce98d3926d6bb5c30bf0193ef7214b7110e3
SHA2568b865a6f67e5b33cf7a3478212d5eb9e128c639d3578e77ad000be6f1fcbed10
SHA512e6128020163750a085e996386a7c4d0d31befb0991d048996299315120aba8d252063bee1555614f16eb993d4e24d0b825ed14e8fb9849c8bc550e7e23b2331b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59f741ab4b1c36cb52d3a63f354da7d0a
SHA13dee9c4cf411e377e2d536f6ec86724a67407c1a
SHA256650ccb53e94cb67188d1f8039baae32c81b1a52cbaf84b88db818cf7fb2c6835
SHA5124c1f4172e4b120f668bed7833511df565c2394b16654201cdaa2d689ac142b6a0b21d2fde23fda40c3462b0235edbecb6b45c9530c6e0a84aa610357d0433d18