Analysis
-
max time kernel
840s -
max time network
847s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/02/2025, 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tria.ge/dashboard
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
https://tria.ge/dashboard
Resource
win11-20250217-en
General
-
Target
https://tria.ge/dashboard
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5732 msedge.exe 5732 msedge.exe 5488 msedge.exe 5488 msedge.exe 1776 msedge.exe 1776 msedge.exe 5996 identity_helper.exe 5996 identity_helper.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe 5488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5488 wrote to memory of 3156 5488 msedge.exe 77 PID 5488 wrote to memory of 3156 5488 msedge.exe 77 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 4460 5488 msedge.exe 78 PID 5488 wrote to memory of 5732 5488 msedge.exe 79 PID 5488 wrote to memory of 5732 5488 msedge.exe 79 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80 PID 5488 wrote to memory of 2748 5488 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://tria.ge/dashboard1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ffc189d3cb8,0x7ffc189d3cc8,0x7ffc189d3cd82⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,17286814222583502668,5039171024107565950,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD525d7facb86265ce3e89835dd7b566491
SHA14db1197fadadd7742986efdc2ca76f89cef96942
SHA2563d225a00da389fde7674a7eeb98e8572be2879252290ac00faa3a80ea671073f
SHA512cbfc02ffc441edc20c72b35d20b15178a2173e2a1c54e3736f7ba6d058e1ac7a5c1b15798bf5b91ed3a8197430f0fe84aa3d75a8aba61b4f4dd85c1b3fe68bbb
-
Filesize
152B
MD51ab6627d6da0724908361604b2b351b7
SHA1d6e7960616dd38cd05633face9bb0bdd061e3211
SHA25688a373cea6d7ad2daaee9168a0519f8a23ab9ec9cbceab97df4c8d39fe1544d0
SHA51259903d7dd6da68cb4378eceb6e356d5861514b8365da747da4cd05615ec7c7a51c810cbac6a7a00256db1aeedad80ef71b6ff06bae61e1884e620cc4a45a2d33
-
Filesize
215KB
MD50e9976cf5978c4cad671b37d68b935ef
SHA19f38e9786fbab41e6f34c2dcc041462eb11eccbc
SHA2565e8e21f87c0a104d48abc589812e6f4e48655cabe4356cda9e3c1ceee0acaa4e
SHA5122faa6fff6b47e20fd307a206827dc7ff4892fce8b55b59b53d3e45b7dcf5fd34cebc4776b63da5aa4d0e0408344bd4602d26d09e7a456dd286e93b768cbfaa51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD57c7eac0ffd65955bc3c4067962eae442
SHA1ffe8811c61a603129f419c8596f61b63bb349041
SHA25673c2e37b224d3b29efe7b7a99f6d6af1e48d364dbf293212fc556949539f6018
SHA512e3757fb9f72e09f51b3c558c6d6165e4d01fd10cf5fdfd4a06833162cdb1573ae9dd10a7d9bfb20a67d4c82eddce04e86a491a0c5d7cd8d6f1788279fcc86b2e
-
Filesize
683B
MD580029ff7776b2bb435c109ace0b80ec4
SHA167b8b802edb04863abea2d92941de4fbe24c7dae
SHA256382033b9416e67c8d41c0bbe02409f698639e1dee2aa05e299be5aba9f06b1c4
SHA512ef9e3d6d867179fab31440c822fe3c3c761ac375cebb76da5d20737355844d752bd2daa9eed86fa7c9ea2db1ef3da429bb6da7374897edeac21aa758d69e1933
-
Filesize
5KB
MD5c70da7f69443f1ac4eab314d31344437
SHA160aa2c12f0879d51f8cb36e7b2801b09c21b9f48
SHA256873db41f02a3ed5d0a321d81d185bc901d108d94a4d2c1ed6c77dff1ca203626
SHA512aa7592bfd544fe6b8bca414b00d97894fbb0e8a50286de5c24a2b76acedb805ba83784fda6bb0def0b194ea84f165eed3dcd607dbdb9591fb384afe8e9190bb9
-
Filesize
6KB
MD5946f8b2f045129d563bb866705d0a395
SHA1df482f79e0b94c8970079c85ffe5435bc1c0101c
SHA256e5855354c5a957f1fb9a5a9d547a7fdf36bc7128d3bdbb6e79ddc3767934bb1f
SHA51242ebb87d9ee58ba6fd516c380f0a290fc05e67f0aca2eb980e2c4f1a588cf82df08e3ad179c9a6e2a7cbce724f90b67fee805d3966aacc68a413284d08c3f581
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53c184c77f76ebf119d8273ef43c3c384
SHA1a4203b77a92810b084bd19a72a81171c0bfd5122
SHA256a6e72a10450e2a01a7908a883fbd072e6fa59ffbee003fddd9169b65fd6ff700
SHA512b21e6bfdf30dea5d330abb648f192605e5194e9b8c52447b6f6c224d52796584b97bd82078e6b06101eea9012c7f05b3ef2f80115f3e756d176f1c43670ac9e5