Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
99e64e84dab9d52a36155919c1b56bc4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99e64e84dab9d52a36155919c1b56bc4.html
Resource
win10v2004-20231215-en
General
-
Target
99e64e84dab9d52a36155919c1b56bc4.html
-
Size
3.5MB
-
MD5
99e64e84dab9d52a36155919c1b56bc4
-
SHA1
af703ad8bc39e96543e266b8e36118527b2e4d74
-
SHA256
5017721763957baf6e5823777003f395109635eeec0a0e2ed7d38a308250e95a
-
SHA512
2b9b73a5a9b3af2335e8d4f51d68a1960a68aeadf1d38f5cad01c177547d454253d74c4c55435cba49a25c660548983c7e888f9a12306ce8a8b7b9b9df5a194e
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nf2:ovpjte4tT6N2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 3980 msedge.exe 3980 msedge.exe 3768 identity_helper.exe 3768 identity_helper.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3600 3980 msedge.exe 84 PID 3980 wrote to memory of 3600 3980 msedge.exe 84 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3180 3980 msedge.exe 86 PID 3980 wrote to memory of 3292 3980 msedge.exe 87 PID 3980 wrote to memory of 3292 3980 msedge.exe 87 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88 PID 3980 wrote to memory of 4572 3980 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99e64e84dab9d52a36155919c1b56bc4.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce60a46f8,0x7ffce60a4708,0x7ffce60a47182⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1110681271199233383,9348772044641435369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bcaf436ee5fed204f08c14d7517436eb
SHA1637817252f1e2ab00275cd5b5a285a22980295ff
SHA256de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120
SHA5127e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c
-
Filesize
981B
MD568d2b44483b6a8387e2c3f4c650a2171
SHA199bb312ae35ae65f7fd7889f2672b2e821dc3eef
SHA256cecfd43491b419d9ff34008d19125cf82eaa2c81bb687fafd31ea52381b02ffe
SHA5127d0366e7bca4d1ba0ea6929ff7de3e9baabf7e19fa637a80efce97994ea4063b3718921c4fb4dbc971049f1e49ab7dc64569db444f4103cdf0c8541077ddeac3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5101c8044d1696621a3846362dcd77371
SHA1ec6acf9f66688d7696fe1e60c7a05a72615c7c57
SHA25674867d9cb227dea9733a99f04190f26ae5df5aa40709345ee5b28c67fd4544b1
SHA512c3254a0023c4878a03491757734e6a3469e13dc985f829b59897fbec11295587acadc7094e0005e1a0fb130f2fa288fe7aea62a247b7355cac974e593b982b8d
-
Filesize
5KB
MD503b9a10b00e2ce1cb7a9418754bd0316
SHA10dd79ce63e18b8c1bddd77a6cdcb4fb5ab179a71
SHA2569de35629057f9af71924b2008825bc85406499cd93a837c4609a4a038bbebba3
SHA512ef5b78cc46bb54ccbc8ef7cd19620a7d20d2938364c8204fc84f08abba78ebe32e0deeb83dca05087a40e7159023f8e488e166f72053f039d6f10847a8b939b4
-
Filesize
24KB
MD5b0ba6f0eee8f998b4d78bc4934f5fd17
SHA1589653d624de363d3e8869c169441b143c1f39ad
SHA2564b5ee509e727accbd11493dda2c1d512e7dbfaff66c4f5f7ea9c2d2ccd06151f
SHA512e9a165da246c6b80fc38431538203cf03f95794184ff63f00c9500f8919a2028b803f64b670e685185eed72df0509e3185c9b434fdbf2bc7af36021d46bd08d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5349157f140813358ec2b487390b393c0
SHA18b855c2290574c64475acb122640b62f402d93e2
SHA256af20210bd82df1a5aa0d1605ee543d7de425385ce9b7034213c6d4c49a76da81
SHA512ccc774a83a3f7b8da7c2424760a7f7b04274b61d54fa2c40e47ad0fdeff4ea7dc21e1cf58a125ed73c5ef919cfda7632cced158c1d1136c00ceac69c3c998d9e