Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
database.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
database.html
Resource
win10v2004-20240220-en
General
-
Target
database.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 3700 msedge.exe 3700 msedge.exe 3152 identity_helper.exe 3152 identity_helper.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 1408 3700 msedge.exe 86 PID 3700 wrote to memory of 1408 3700 msedge.exe 86 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 5104 3700 msedge.exe 87 PID 3700 wrote to memory of 4288 3700 msedge.exe 88 PID 3700 wrote to memory of 4288 3700 msedge.exe 88 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89 PID 3700 wrote to memory of 4052 3700 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\database.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd35dd46f8,0x7ffd35dd4708,0x7ffd35dd47182⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2424 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,5123231537153840148,14735152792939616121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ebd667e8db80b0ab07f02f3dc844252
SHA1461bade20eebf59e30e8c3620640d6df6db79249
SHA256d04531e41d70e7832898e797081335b3f0314b09141a01de921ff679dba41b0f
SHA51275f92d1f4ab942c3fdd3b70542956ea246f718aa8808a53f33d52278505f4f783e4c0458e5093ea4f459e72faea431f926373883eed2ec7da1109bd7efc6fb57
-
Filesize
152B
MD5f621c7614503377ba83f2fcfca1c303b
SHA1c7ec737f8e0262052e038691e5b38db37bdfe56e
SHA256c2d2e04acc5e2cd129dd3211f73b498043051b74a2f661c1199224b37b681b26
SHA512203e5e582007efb7d11b0442e85d4e37a4cc1332bd6367cd74b0d4b9de0d0df85757bdc66474f62309bf530841ab7a5e4c0d43c95aa416b7175129e2e2b36c26
-
Filesize
6KB
MD59881d2199a655aca0e006ce94e9f4ac4
SHA14108aef880db9d6096e9120b8af2a52add5d0d5a
SHA25692cf3623bca1bab88fc9b70fa8beec127036e9f63932d9bb98ccba39ee6242d8
SHA51274fe164fdfce2a71b8ee13702592d8dc57950b2d1311a00dd322e5bbe1d7f3aa313f059341ca55806e8fdcbd062f9ee79f325be579a4b7b4796ede2cda6ecdec
-
Filesize
6KB
MD5d9f48700cafabd1f26adc554862db83b
SHA1a150195879ee526e956eb49787d3b02619299968
SHA25662440db30a3bbddaa76b17ed063fb33cc5244c82d9926445d580d2e856dbb3ea
SHA5126ae44dff2baa6625b5366b26b969da67f7d4dc788b443d5163df1029a3151aa965443aa702ad000ea89f731ed7fddd3540cb6b118da0e3cf1aa728c2adbddff8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD557d976627e5b3039a4da5ca012f8d371
SHA13836070c24b99ed1e22c672cf6ea7a8953270b06
SHA25672a44717bd0c62ce1a92956229a5158a828040d3548bf1f2cfb659e69f05723c
SHA512b186e2ab246ec5f6e0754c374b3a11e510edf87e780243cd592db76f768f8323801d2a43302bfd082b534918c6267ef154ea156d2f62a42780fe78fa5cc9fe86