Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2022, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
e4963436-be97-4aff-b3ea-b3735869c783.html
Resource
win10v2004-20221111-en
General
-
Target
e4963436-be97-4aff-b3ea-b3735869c783.html
-
Size
312KB
-
MD5
75a1afe9efce8d010eb4015b4fecc15b
-
SHA1
1f20fd519fd1aba34c709cf6f71109b4ca4a75f3
-
SHA256
bfbf81e27e11025e5b090f813f6c28ea9f03ec247bd3fdf5acb82d97336ef683
-
SHA512
a448e304f80205f801c5b29ec5befa3c3e13c27603b3dc4e3347b0758c3e57780413a442ce6da6b64bc394aba87fcaadd3c6e840283a91ed5deb2c1ff5d306f5
-
SSDEEP
6144:vEvF6rfeQQDZT0ybB2oOY3wHbb5BGaSg2rsisHOSem3N/DkSf3Yx1VJSxt+ooYu/:Ms2QQDZYQhOwwHbb5RSprsisHOoAK3YX
Malware Config
Extracted
icedid
1268412609
ewgahskoot.com
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 100 5788 rundll32.exe 108 5788 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 5788 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221219032310.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e36aa604-0fe6-4f0c-a9f7-8d15d15f4d45.tmp setup.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service msedge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000003 msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\HardwareID msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2104 powershell.exe 2104 powershell.exe 4220 msedge.exe 4220 msedge.exe 1720 msedge.exe 1720 msedge.exe 1208 msedge.exe 1208 msedge.exe 736 identity_helper.exe 736 identity_helper.exe 5788 rundll32.exe 5788 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 4232 1720 msedge.exe 83 PID 1720 wrote to memory of 4232 1720 msedge.exe 83 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 2968 1720 msedge.exe 88 PID 1720 wrote to memory of 4220 1720 msedge.exe 89 PID 1720 wrote to memory of 4220 1720 msedge.exe 89 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90 PID 1720 wrote to memory of 1884 1720 msedge.exe 90
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge C:\Users\Admin\AppData\Local\Temp\e4963436-be97-4aff-b3ea-b3735869c783.html1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-redirect=Windows.Launch C:\Users\Admin\AppData\Local\Temp\e4963436-be97-4aff-b3ea-b3735869c783.html1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa137f46f8,0x7ffa137f4708,0x7ffa137f47182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff745265460,0x7ff745265470,0x7ff7452654803⤵PID:3532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3304 /prefetch:82⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,8756561250140529675,14260756754062317786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:6052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4428
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c palpodaddcue\apeDee.cmd1⤵
- Enumerates connected drives
PID:5704 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h palpodaddcue\woodcutting.tmp C:\Users\Admin\AppData\Local\Temp\*2⤵PID:5764
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\woodcutting.tmp,init2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD5ce44fd49913781b776a9196c96ea863b
SHA1f28fbe72fb58337f51e34f21c31a2fbe21c9a13d
SHA25609c632f84186daea50b8bbba8d41f7b4e3018a094ae3c41ff60034e480c85485
SHA5122352ffb81ca92badce2bd8873c9a068ec4a13a01d7e878cff98b3d4971a60551cdd0dbfd73f8c8243e4189476e16dc2ff338a732d40c1e360775eff970a65798
-
Filesize
374KB
MD5ce44fd49913781b776a9196c96ea863b
SHA1f28fbe72fb58337f51e34f21c31a2fbe21c9a13d
SHA25609c632f84186daea50b8bbba8d41f7b4e3018a094ae3c41ff60034e480c85485
SHA5122352ffb81ca92badce2bd8873c9a068ec4a13a01d7e878cff98b3d4971a60551cdd0dbfd73f8c8243e4189476e16dc2ff338a732d40c1e360775eff970a65798