Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/03/2025, 00:07
250323-aejphstxdx 823/03/2025, 00:06
250323-adrzhaxqz8 823/03/2025, 00:05
250323-adkkestxbw 323/03/2025, 00:02
250323-abxrzaxqw9 1020/03/2025, 23:27
250320-3fd5mstrw6 1001/03/2025, 19:51
250301-ykw4sszqy9 801/03/2025, 19:50
250301-yj8ffazqx8 801/03/2025, 19:47
250301-yh1dfazxev 801/03/2025, 19:45
250301-yghr1azp15 1026/02/2025, 02:07
250226-ckdrka1m15 10Analysis
-
max time kernel
58s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 19:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20250217-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 64 4824 msedge.exe -
Executes dropped EXE 1 IoCs
pid Process 5832 Curfun.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 63 raw.githubusercontent.com 64 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Curfun.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 556448.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 2220 msedge.exe 2220 msedge.exe 2548 identity_helper.exe 2548 identity_helper.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 668 2220 msedge.exe 88 PID 2220 wrote to memory of 668 2220 msedge.exe 88 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 2736 2220 msedge.exe 90 PID 2220 wrote to memory of 4824 2220 msedge.exe 91 PID 2220 wrote to memory of 4824 2220 msedge.exe 91 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92 PID 2220 wrote to memory of 3424 2220 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8761502603809433755,6881604594443044274,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:6056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5628
-
C:\Users\Admin\Downloads\Curfun.exe"C:\Users\Admin\Downloads\Curfun.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5964bccfcc954936df7bb6460bd1eeb4a
SHA13dfd9069e12371805a9e3c65bab699f78ac4f914
SHA25677491b090ff66f2af75a497184c6c66d882a81a2eccacb188b72a5510244f8c6
SHA51280bb1f29ddd3ed542650b7883f976c36f9277dddc8e80b509d93d078e8efe442c839daf51d4ae8a3c7a5f0442e90fee707081164e8c70f7f9818d6df20af8277
-
Filesize
5KB
MD5aed40177598673e5aaaa2180a51d5793
SHA18f6f98389162fed142a483a2df5ca8020a0c8dea
SHA256fff90c2561bfbd821cf57b14bb847225a58d5fded322aab47a704dff066a62d0
SHA512787e83e601c0e63d3f870e9554e7753867d36c2211db65b7774f37712f833ff20a9534e40fc6136df2f6ce877d46e1f1a7e25788779f28965213344491144be5
-
Filesize
6KB
MD56ea27d5482eef4c4e24294025f5fc892
SHA14d9e91929a26c13113c63cf5bd6ff1575e2a6ab6
SHA2568962230bf2096b605b2b6e9a315f2589cff4b743fc669721260af6d146769a6d
SHA512f050336224594971171acba1a9a15ac34a765e3f48c57dc3b17f1618f64fdf941715968691029dcfd569b6ce8490fba9af73592b85585f807c5a988989bc0918
-
Filesize
6KB
MD5f8907ccbd6d264e9f2d23da7abd84853
SHA19dd21dabe3cf86970a49f9726560c08fdf397059
SHA25691f914c3683be43445c4f6425e7e8ee721c082ec1c9ff5d5b237486ccf6f75c6
SHA512a963ab4694c807c22a9f3d3e2599ad3fc89d68ae639a2ab879859f133e658a1902206d70ae30142a260f343c7fbc8182e31b5a4da36e8ce6dd302397189acb29
-
Filesize
1KB
MD5946f64c14a889814c843eaf5bf8c51a6
SHA180d2ba5098026f44056483cfee247990d6809547
SHA256d0574c0a3bda96dba58a17d793f484becf8c450fdf262dc6aaf8f0f13470306d
SHA5123a5cfa3256d1c848a7c76815c7c261eec2b50c9749d92e6a1db0c0009504087f8a03857542ffab23f386ccebad4cc21b48b172e7851edc461bd651b58be466b7
-
Filesize
874B
MD5d1b08072b0b05fe2d0efa1cee0a5c0c9
SHA15f7e12bc58e1b2f7bd018b5ac8bed65e5f5e946c
SHA2568666973fa7d18321c82e882107582bf8b0d893a31a1ada8a714f5976bb78ef46
SHA512be4ff29f4e14b8c5a55bd15782db6666297f9ecc1861a699ed59bab9485ca35e3fcd4e21dce269b24b4b7daecf4695b4869da48979c6cf9d99f08fdb9b05d76b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fdbea63316a6639d38eb723d2dc86c92
SHA16ab87f63aa74cf571ab5a38a047fd40719e6407f
SHA256134a77fd24af9d714dfd373c93a59da71469901022bac9f0d15d11d0784ba495
SHA51206b07d587a6af9accf346fa49796e075ae600f7ea896f42fad2d4765196039e31c76932de3b43b37129d2654ca5c5a2f19d659c46dfa0e2df36498492a5343bb
-
Filesize
11KB
MD518acc7c48524a470de84437c704f3ca1
SHA12077f9a684567e26729a1b45375912fe2e8fe405
SHA256a54eda3bdf4f1e93cc7c8aa92acd16655cc34c01c6c06e1265496be5f9cf9819
SHA512b1ac29c6a032e1f0ede95fefa0bbeca33bfe2fb4c3e087b0bc7691985b1fef278f77a06cc7b30d06b170402b597ac4e4cda4799075ce38771868dcfeb70a9bd9
-
Filesize
138KB
MD50b3b2dff5503cb032acd11d232a3af55
SHA16efc31c1d67f70cf77c319199ac39f70d5a7fa95
SHA256ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b
SHA512484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17