Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/02/2024, 18:34
240223-w72lpaeh43 723/02/2024, 18:28
240223-w4hz6sff9y 123/02/2024, 18:24
240223-w19cyseg54 123/02/2024, 18:21
240223-wzl62aff3y 123/02/2024, 18:14
240223-wvkgmsfe7x 1Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240221-en
General
-
Target
file.html
-
Size
311KB
-
MD5
cea20f062ebb4e5df6785854fceeeedc
-
SHA1
7b224ce16763c893f95c408d42b6024aa809a5c5
-
SHA256
57cc7cae6afa102276b50bd702b867e08b26813d2205b0fc4b482f7bf891ac1f
-
SHA512
791a3f41c6e8fecce047fea8151ea218bba54634f770fdcebf52248c5ab9599e920cd3f581f0cf9c91dca1952767a4579ccad073544888ed3cc846b8c819bb73
-
SSDEEP
3072:0idgAkHnjP/Q6KSEy/0HgPaW+LN7DxRLlzglK8hTr:xgAkHnjP/QBSEjAPCN7jB8hTr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 4328 msedge.exe 4328 msedge.exe 3008 identity_helper.exe 3008 identity_helper.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3960 4328 msedge.exe 86 PID 4328 wrote to memory of 3960 4328 msedge.exe 86 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 216 4328 msedge.exe 90 PID 4328 wrote to memory of 1340 4328 msedge.exe 89 PID 4328 wrote to memory of 1340 4328 msedge.exe 89 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88 PID 4328 wrote to memory of 3716 4328 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdff0046f8,0x7ffdff004708,0x7ffdff0047182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2392 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1804 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,3988528861470908052,16843273548857786223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a65ab4f620efd5ba6c5e3cba8713e711
SHA1f79ff4397a980106300bb447ab9cd764af47db08
SHA2563964e81a3b4b582e570836837b90a0539e820886a35281b416e428e9bf25fd76
SHA51290330661b0f38ca44d6bd13a7ea2ab08a4065ec4801695e5e7e0dea154b13ac8d9b2737e36ebe9a314d2501b5ef498d03c5617c87e36986e294c701182db41b9
-
Filesize
152B
MD5854f73d7b3f85bf181d2f2002afd17db
SHA153e5e04c78d1b81b5e6c400ce226e6be25e0dea8
SHA25654c176976e1c56f13af90be9b8b678f17f36a943210a30274be6a777cf9a8dc4
SHA512de14899cfaad4c312804a7fe4dcb3e9221f430088cb8bf5a9b941ac392a0bbad4e6ca974e258e34617bbffff3bf6490fa90d8c6921616f44186e267ddaa02971
-
Filesize
1KB
MD519de3e67cce48aa7e5f8809121e8d057
SHA1c90808089e3f4c44c4669e6fea28c4e1487f42a6
SHA256f1afa4ce02b2b9d1f0fe716db1ab558cea4ce9e672e0ad4d93a3a8da6b2585b6
SHA5124223f0d801dd8d952b866a370ed294cbf1f3169082e9a39c5afad3fc1a7a7e392a71f247c9681b7897c8dfd0bc78c0a8cf0122461382127b77c6dade86498bc9
-
Filesize
6KB
MD5baead691a1026ef00cdef0740c9ccca2
SHA107475a4ff2bfa9bb260035ffb3de89a2445a1e38
SHA256f61508022adb28f068bbadc3d9a5ab2d8d403a67f0f9ec94722c6602d3408f7b
SHA5121cdd43a08d1899fe134903f822165e66632903f55791020f5b44ce7b6d3fc03233028660bd85d37d04b897567b0c6e2b596cc0b5f628f362bff0352e9882de2b
-
Filesize
7KB
MD5b92852a82261917dd2f2adb1a82fa8f9
SHA1ee7f16c24ad18bdd502aaa3cec402e4b75e4e89c
SHA2567719fe88ea031b406f310b387d7d38a20656852b5d3273dd5e43574d23205301
SHA512db0ebace57f41c9078e15857c655ff1345046b05f9bc0b8607babfc4408379fc1bf946966e20bdac4d813656f319ceb80e028f22365968158ebf0500aad1ef69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a350158045212c6d680e574922d64f29
SHA1bffcf5b22a93fd5402d015693859e8e5d02f1c68
SHA256927f36dc6dd233adc615074cf9e723ee669d578ea37fe8e45ad2ce29203ca965
SHA512c8a471a3d5b1fa5aad89c63e4b6c678798ddafa0c02c14db481a236428a9a6f147728c7c9815edc2e60c5e0b934541793500157849b87688b0bfc68675b63293