Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 15:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20231215-en
General
-
Target
.html
-
Size
253B
-
MD5
20ad84d030031252141ca0b3fc0183f0
-
SHA1
108b6115dc6ebfde76aef4336126f605252d957f
-
SHA256
50e770b96bc49d107e17a982422d4eefea5bb4ad5bdb5bbb88fd6200ecf2f689
-
SHA512
39851b4946abaa4559b301ca7ba53e5dcd35c87ad580709699d91ea17c84121356c6ffc5104f66ff0528c589b3d81c9d6378eb9722f61593670ff41b47ef2cc0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 3940 msedge.exe 3940 msedge.exe 1552 identity_helper.exe 1552 identity_helper.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4060 3940 msedge.exe 71 PID 3940 wrote to memory of 4060 3940 msedge.exe 71 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4036 3940 msedge.exe 87 PID 3940 wrote to memory of 4076 3940 msedge.exe 86 PID 3940 wrote to memory of 4076 3940 msedge.exe 86 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85 PID 3940 wrote to memory of 3412 3940 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe5e346f8,0x7fffe5e34708,0x7fffe5e347182⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16002287070345784054,14521135030073386516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request193.78.101.95.in-addr.arpaIN PTRResponse193.78.101.95.in-addr.arpaIN PTRa95-101-78-193deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request189.178.17.96.in-addr.arpaIN PTRResponse189.178.17.96.in-addr.arpaIN PTRa96-17-178-189deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTR
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
193.78.101.95.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
466 B 7
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
189.178.17.96.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
48.229.111.52.in-addr.arpa
DNS Request
48.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD534dec3a7cd0b1d2e9d258c8624034898
SHA1f7a6865d9db2a73ee0db65488c6a4206f5247640
SHA2569b80f5ff85cc9a6f354904c5c8f2c044c3c0685d3a93ff2ac1703ffdf458ec25
SHA512e85e0e2a642172578f50bd1a250adf2b178c9d759775300158940855e10a5c3a141abb033641ed4b502cc7254deb9f65de4058a5e2839bb501353c68cf0886ba
-
Filesize
5KB
MD55905f4814ac6f4bf216580eb291b6899
SHA16c57058fe1952e91acaa146ccf9da7300f50b98d
SHA256fe82a5ac60eb23c154abbf58a90231a6dffbdc6c82bb96b3c91e1c7b3397f534
SHA5126b721ef20a264371b999e3d6c6e1e16b65e06ce08af5ebe68c8e4038ad8402e40b3549f6b5d6d80420130a05bb9f21fbb0022214f4d358ca24dd943680ec7f2e
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ccbb6d153c1d2eebac471f56a62ae262
SHA1f5eb51f42225afeb8a14bb91519ccbaaff404a03
SHA256fc09dfa2d5c96ba4fbeb0e2f2869aa546d1a414d7a29dfb0d98d032d815bbb47
SHA512be40db8fce072961ec66bff284913f00de741bc942b755bd3672ef7e29a1640330e447d4450b296b5fcb1b84fb55320f7d3f342d2e1db7fd2f54195b496816a2