Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
BubbleBoy.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
BubbleBoy.html
Resource
win10v2004-20231222-en
General
-
Target
BubbleBoy.html
-
Size
12KB
-
MD5
bb7b91d1685db89b58ac01a72921e632
-
SHA1
4a1dd457983a7f1bbc7943eb5fca3da6d93d4176
-
SHA256
940a563df059604ac0dc6a92a845da2f04236b86887208b89969b70c6781c3f8
-
SHA512
09e26d197b22a4553e2e87a9ee0957700766c2dcd11157b5b71744d67abfa30d71d45c7bf1081bf9337527e3b8aabde99b09bd2bd30aa302329ebf480078307e
-
SSDEEP
192:W1VoVk8X2TrWAXaR06qVoVk8X2TrWAXaR06LV:Giui2TSw6qiui2TSw6LV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 2328 msedge.exe 2328 msedge.exe 4620 identity_helper.exe 4620 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4476 2328 msedge.exe 85 PID 2328 wrote to memory of 4476 2328 msedge.exe 85 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 4660 2328 msedge.exe 86 PID 2328 wrote to memory of 1944 2328 msedge.exe 87 PID 2328 wrote to memory of 1944 2328 msedge.exe 87 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88 PID 2328 wrote to memory of 1176 2328 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\BubbleBoy.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac28c46f8,0x7ffac28c4708,0x7ffac28c47182⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14792845360607641366,18433545407476964379,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5c448280de5013f4c597af90701448bdd
SHA17b56ff88bcf0c41f75dc0f3d2a2f1ad8f3f42a34
SHA256a8faf99081884f0e992480b093780454c49a8c867b58475926092568bbf698a5
SHA512da68f9956ca317b41599b35a1898ebf0f85e4f2f7182bc40c5213f72290f85881887e516936623f38db11079fd3f3feaf1cbca0b0be6c4dd626d00dbf357e34b
-
Filesize
181B
MD5739367aab11ecf4bae74254d25d5fa00
SHA108c1c35b706131d019f406f66c72518b56b57fc5
SHA256d84bcdb79f45330d86bf4cb40563d544e59b8358c70f2782c6de442106d2dc9d
SHA512c398a20fc3ef06fca9770f1251805ff74cb7e108183c597285d2a57cb7655d7be775a305f91ebd02cd692e675614bef329e0a6a6ae03aafba4f4139ed96a8ffe
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5ae99a63073f9a5f46669d6f9b5ad65ae
SHA1e84051e643cc2dadfe7cdbc0e4130112a031a898
SHA256e82825d666001a28a23478e866b07a0684d8ebaf30677bd864d4062d4ddbb553
SHA512345633f3f7da5e9247db8685e482ff72150a06af2631108f4ff9e5ebb5fa8de6dcf809e8225adb620cc1b5e5aa1af7878471f175c9c1d8dbea3e4ec9a70911c1
-
Filesize
5KB
MD5f51c1f0a8744ae9549bc379e4792012e
SHA112c8772f689b7ad1868c2af235a22f7171424b7e
SHA2566ca525ae2b8c86c6b20337200625bc73c55c062bf99fc2b458dc7ef56d36210d
SHA5123698b61c2e1a203935001a05f629103ecccabfcbefe00c8f8021160073e8ca31b600d32dd8ed9b21c9400701b62a82629154b686ed88349c0d4359da52edc6db
-
Filesize
5KB
MD532dde1fb6dabdb4a0419ed1dbdf1fd7a
SHA162b4babf61592b27d22a6677c13cc7efc0341b75
SHA256cc8490eb2f8591b01c90be52804a42b2aabd3832f79a4001d1a34691e82e7168
SHA5126dfd4d3897cf111538e8ff2cde1472e1624f915353670e856327dfebc8d9ee95aa9f297dbc03a6c6d452b5a8cd89711a8e62bdd7c4b6006199a939dd4075cbb3
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD587e580dab0214a06a376905b7fd35faa
SHA1db9b3943947dd4d925f31565b51c15f81469ed80
SHA256ce088745191a9b2f4cbcb3325fe61442492c965f95db4fca0db6cf0374a79c91
SHA512fe1eca53a80c60ab108529593f1b2c924e3ae57d25a2d1275e4c17ac4a08d5e80cc87bd79204e09978a789807df95af92e89a74bc2dd663cbe4c8a4af16aa79a