Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
98419e5ed501923de3d5bcb18f8a4eca.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98419e5ed501923de3d5bcb18f8a4eca.html
Resource
win10v2004-20231222-en
General
-
Target
98419e5ed501923de3d5bcb18f8a4eca.html
-
Size
6KB
-
MD5
98419e5ed501923de3d5bcb18f8a4eca
-
SHA1
9c6cce0bbcfff4d9ed20e42727722ba615a530d6
-
SHA256
4ea468727179e9d1e0e3e4ca03711810832673b444c28d1bdd89b7fb20fb9247
-
SHA512
41f36b6c93edef9cca7804c3adce6015f510f3be34fc62af846bc9fa31f107979b5b13adffe277f43ddc691ca6289f896feca38dd58187e9ef4902b4fd3c818f
-
SSDEEP
192:AU6BdVi7CfVdBbUNHkAN04L1nRRnHak9Llih0ukmrrrrrrrrr6:oBdVi7CfVdBbYHdbhuZrrrrrrrrr6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3868 msedge.exe 3868 msedge.exe 4964 identity_helper.exe 4964 identity_helper.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3896 3868 msedge.exe 84 PID 3868 wrote to memory of 3896 3868 msedge.exe 84 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 1720 3868 msedge.exe 87 PID 3868 wrote to memory of 3744 3868 msedge.exe 85 PID 3868 wrote to memory of 3744 3868 msedge.exe 85 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86 PID 3868 wrote to memory of 2964 3868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98419e5ed501923de3d5bcb18f8a4eca.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff96c46f8,0x7ffff96c4708,0x7ffff96c47182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4230314517948461065,9364311184668779400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
5KB
MD50584fc5a270493d81c820e75cd2c4ca3
SHA19ddd757b9ce9651f3a7664fe298321c9f4e7d139
SHA256787cc4612a110c2615cb89032c42379f483a3eefcc12856c73c8494c7602d372
SHA512fd15669f7c291ccb4d3a8f34f79fce3453465865da45ffc842d9f9f7578e6cbb334a6f5b5e7a1a5b70caf28809254c34d9f67087c04b7b3891f442076e5dba56
-
Filesize
5KB
MD5b933e39473614f058ea55feb89fb18f7
SHA1ed1ae0f39931428c1987db0fa8ab2d13b220ebdf
SHA256d656cefd3fc8b8f393ce1847e3e3bd9393faf58dd83a8bcb0d1700055fad16a0
SHA512e6d96dfcc57405e365e083dd4fa0d7327242a71a5468a3722b3b58de4ee39299ed282d5cc9344d31d99f76ae74bfe66f26096c425db7c66f935d2c10f8f05550
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5035403b32ec3ded0edcbb63c7b6d2b9e
SHA15ade5d2751b7266942db4ea7fd0570eb63addb89
SHA2566bad01b140b13a2516d54d6d474a945c83265ab10b079310dfa7ac9a281a92a5
SHA51206a7196221ad4575985e55195b7e2e08342bc540dc1520a0b7ac714084a7107f500ba686aa1ee21ba37c1482b8c7438d118203f95d1768194db06c75ac6d64e9