Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
Play Voicemail 45 sec.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Play Voicemail 45 sec.html
Resource
win10v2004-20231222-en
General
-
Target
Play Voicemail 45 sec.html
-
Size
447B
-
MD5
8f846717509d0edb73f782417028983a
-
SHA1
3f13220ed4b125d11bf4b3d28e837569f4f82cc6
-
SHA256
aa0c09d70ecbb1767bd49b505d3695b409cf1d4e7714f644f217007f87fa1ab8
-
SHA512
5a509ab32daa6244e5d7a5fc60ffedbe471a4c30c574441a5dd5a4b86c978a874d5d1311ca77b91db45db735060535c2d6743b1ea2e3e4e5a684225241b9fc5e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 4676 msedge.exe 4676 msedge.exe 3496 identity_helper.exe 3496 identity_helper.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4112 4676 msedge.exe 83 PID 4676 wrote to memory of 4112 4676 msedge.exe 83 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 1044 4676 msedge.exe 85 PID 4676 wrote to memory of 5068 4676 msedge.exe 84 PID 4676 wrote to memory of 5068 4676 msedge.exe 84 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86 PID 4676 wrote to memory of 3728 4676 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Play Voicemail 45 sec.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8291b46f8,0x7ff8291b4708,0x7ff8291b47182⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,8726018977707375145,11179266437449976204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
494B
MD5b14a2ef7f064d8c0ffb42ed1c6cb5dd7
SHA1434344f4bfa9ce6d9a4e3b327ea5e8fcf1365658
SHA256a6e2e8800cad5462436b500310314936d860347795565b5b0f30d46cdc0f1bbd
SHA51231a3586a08c930d2a2ff92da6ea9b3c60a39d6af317c7ffad652bc70a4e26913d6680cd0ede204d1f0d398f2fee5ff6142e77adcd4d12a866a9f9a029f5cbf5b
-
Filesize
5KB
MD5b9d6dda6dca992eee7b8c9f76f21706b
SHA1911ad10c8339ebd734236ae64d8738b365c0b880
SHA256b2b3ab78cbee6bc3d481b417e7feb7c0ed6731f2636586c57a636eb9ff61d9da
SHA512b0b7428e7f7f4ed80f615fcd7cd0ebc2cc68a22399b52d7396820f0d6f5553cf5612ccbbb6f3fac0027381fa6a1e7da69d6aef7846dcb50c2fc6a6b520a2d2ec
-
Filesize
5KB
MD511734017a78a100350adc2efa062fc79
SHA1b7531d9ba3148f0de433e7f518fdd24714890573
SHA256d2c0adf2f951093c236625d81a262124010ef98d6fd9125b3df6f39774486b53
SHA512e609b307ce32c61918c9352200a648d56f44648262c31018ed252f58255a47592240a23e045456771ab972292b0a28b01bcba471a6ada8a7cd55857c6d0d5571
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5802414d4ecc1e41a6407e195fb8c8ed2
SHA174b7322feca6469077c606e5be72d0c97459ac28
SHA256214958065f09c33d623f9d0297f086094e5b40b1d800a0cdcd3423c0060ece6b
SHA51292b1ab85035a35dad07fc1ddecb6f35f6c5b05a07374608398de385134f6af35a8bf06f4f4a6b8f8f66c23ddec7b6280ea834ea174472007aae5f5242086c8a9
-
Filesize
10KB
MD5b70f96ea266ba9c84a0e9788db009c25
SHA160592883e27589871018b24391850c266e36452b
SHA2566014366434945c47c127eb3a82e03dc7e57e32f701bac4a3400b9ea386833380
SHA512e3ed80688bfc423a021ed2d28921d0ed0dd1ce7a3024dc5d58c823158639e98dbe1a715d552865b672ff878b0ffa43ca0e8ab9deb62263a53b5776f987a31c5c