Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
a155312b9e8ad6cccd80ad101c858eb8.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a155312b9e8ad6cccd80ad101c858eb8.html
Resource
win10v2004-20240221-en
General
-
Target
a155312b9e8ad6cccd80ad101c858eb8.html
-
Size
55KB
-
MD5
a155312b9e8ad6cccd80ad101c858eb8
-
SHA1
9886d8df9cc346f8e3b50b9bbd7783e9c6391541
-
SHA256
5fc7545678128f01e36397460be50d88828e4f82537e990a5ca17a9eb4f8d329
-
SHA512
b7fa009af52bfcb527211fb526d0ceb7900a1d2538ddaf461988446301f5ba7f70b3b62fcfa65a0f0d698b03d70fc9c6e224d1a5ca4647ffea8a634b089a567a
-
SSDEEP
768:2rlpHvvCIooBKsbXWHCzVg+miak1PR6dlWu/:27Hv7oGKsjWHC6+raoJ6dld
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 436 msedge.exe 436 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4452 436 msedge.exe 84 PID 436 wrote to memory of 4452 436 msedge.exe 84 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3892 436 msedge.exe 88 PID 436 wrote to memory of 3624 436 msedge.exe 89 PID 436 wrote to memory of 3624 436 msedge.exe 89 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90 PID 436 wrote to memory of 1840 436 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a155312b9e8ad6cccd80ad101c858eb8.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb36f446f8,0x7ffb36f44708,0x7ffb36f447182⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3817899560388141503,15553032587106364946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD591746379e314b064719e43e3422d0388
SHA165f1a2b5a93922d589142a6edf99b5b35d986dba
SHA2560b3cf8ae20afd84c9bf06546e876c84922cb5800526df72a628479f4d5487df7
SHA512a783d8d9613cf92020fc36fd27d384dbd4e105a1ebd02c4507bf7263e61ff5b377e6d1734b066700782fa64bcbeb11af31ac3972d404625cbdb587cfa3bc0808
-
Filesize
152B
MD5ccf8b7b618672b2da2775b890d06c7af
SHA183717bc0ff28b8775a1360ef02882be22e4a5263
SHA256ef08e2971a9ba903c9b91412275b39aabfd6d4aa5c46ade37d74ff86f0285420
SHA512eb550889db8c4c0e7d79b2bd85c7d0e61b696df10ce3d76c48ab21b935c7ecc7b12403a00d6570e7d8e4121f72747242c2358f8f0823f804e704bd44ed603b97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50ea5a62bcf745077676b922ab124ae9f
SHA1f375e83ad43c431e326ef573e3bf2a0897f424f9
SHA256bd087432061dfd3faebacdff01a433ca41d214e1c0e7183d50e5e505af45bc7a
SHA5120616fbcfea6fb77afcecfbf4093d94a6816bf5187e486819893d64b653d15f4e67cc0fd8e2356a10d8cce3f89f6592ef6023ccc8a8d6935f86ad41edbb459578
-
Filesize
1KB
MD57f49f660f336b8bc4a3e89027ea66393
SHA19e1f076e080b5f225b668dbd00787633c1dd826a
SHA256c837790eee26a68da7790d990b6ec0f45bb740017994f3c3a2acaf89a97d3112
SHA512adac295d6c629c22ce2ab699491c393ab71044c694272230efbf210d3ac0c8d7fb4519c3bb2e6b539e84b75a17c196b4981299b2efeabf931b0434067ec5b3fd
-
Filesize
6KB
MD513edbd80ca12ddc0d626c05a271cddd1
SHA13e3030ae7da726fb3cfa3c776ae08bf63286b945
SHA25695ef74235c4f9ef813f7f9851191c664ac307e7bce2d75777dd6e8975395f442
SHA512db28dd38a2be2af8633c96087f13bdd07c98d069c617dec50c9b029bea89bb98ff8222b111bf7d449d22d2a3c6374ee0e3421cd99fedb16ec2d7acbf1d695c36
-
Filesize
7KB
MD500851576c00b2b072e5f67c3ff540685
SHA12ba4872388b4161a61270cb0efaa5f6ef0c8cac8
SHA256dc2a123ffed85a799db561a67151a31758ead307ed165b737f19f3ebe9b7bf4a
SHA512a7ba8049ec6fd5300dd90ca203cd663ebc8da86a35306e8e08b21759fc87fef5029f8b529c477e30ac6cd7c88de2ea60dd2a59761f8f2d7d59be47cebafc1a6a
-
Filesize
6KB
MD53175c041727ea8647f959862906ffd83
SHA1c96a675ef8cb9898719f85ef8ddd9ab1cc1f3eb9
SHA256c93a1b2c0cfa61fc7eceac6d1bae658a2da1617b14a8752bb2528bfd748e3c20
SHA512a3fca1b51b138959c01e94c21080cfaf2622f93ec875e503b41cbf021e36457a97118fa9f3d1384c508645baf72ada767ddde9f1b4a74fb4e585b0d3587b6a8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e99c4629c947119819985fc96a17ce0a
SHA15774d600e29be4e26c60b6b07d4922a9d3710710
SHA2566bd77183dea543e025885b5312b86ed50030a309ca0a4fee8f7f5c7edaad142d
SHA512f04e5874269ac3ed6af34b4d6ddf5bd201faa5f73384919477b7d1937ad7b28f6ba1abf14a619349d458a53f7f595067d796308d53a58ce0030a89042976f7ec