Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
a1dc7c32faab42833c1a6733ad7f994c.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1dc7c32faab42833c1a6733ad7f994c.html
Resource
win10v2004-20240221-en
General
-
Target
a1dc7c32faab42833c1a6733ad7f994c.html
-
Size
11KB
-
MD5
a1dc7c32faab42833c1a6733ad7f994c
-
SHA1
3084bcaa4abf59f1b3889558d2fabaec8d91a838
-
SHA256
335acff4b335a4b0a02c6cd8bbf6322f4373c03199fe11b218feefd569d50328
-
SHA512
3a88c41d8a3a2e6ca684c27598af55ddd38ff4664909af3d9175186da20e9de55184b44f432aa2e66f1bc25ea3a3f13f56af7bb3cc3c59013943c6f803e23559
-
SSDEEP
192:nscrRZxx60V1/VGuQf501V1DDtj/lJ9D04or0GrKXN4EujZ:sc1Zxx60V1EuQIpj/lJ99oeXN4Eud
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 2772 msedge.exe 2772 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2984 2772 msedge.exe 87 PID 2772 wrote to memory of 2984 2772 msedge.exe 87 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 1176 2772 msedge.exe 89 PID 2772 wrote to memory of 3060 2772 msedge.exe 88 PID 2772 wrote to memory of 3060 2772 msedge.exe 88 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90 PID 2772 wrote to memory of 4260 2772 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a1dc7c32faab42833c1a6733ad7f994c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa606346f8,0x7ffa60634708,0x7ffa606347182⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,475396380215792061,13928703456761805498,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD591746379e314b064719e43e3422d0388
SHA165f1a2b5a93922d589142a6edf99b5b35d986dba
SHA2560b3cf8ae20afd84c9bf06546e876c84922cb5800526df72a628479f4d5487df7
SHA512a783d8d9613cf92020fc36fd27d384dbd4e105a1ebd02c4507bf7263e61ff5b377e6d1734b066700782fa64bcbeb11af31ac3972d404625cbdb587cfa3bc0808
-
Filesize
152B
MD5ccf8b7b618672b2da2775b890d06c7af
SHA183717bc0ff28b8775a1360ef02882be22e4a5263
SHA256ef08e2971a9ba903c9b91412275b39aabfd6d4aa5c46ade37d74ff86f0285420
SHA512eb550889db8c4c0e7d79b2bd85c7d0e61b696df10ce3d76c48ab21b935c7ecc7b12403a00d6570e7d8e4121f72747242c2358f8f0823f804e704bd44ed603b97
-
Filesize
313B
MD5029043e22ca3f1a5d6ef842db50030ce
SHA109adc8c2b2f46d6cd0748dc39e93d4041000b7be
SHA25604f2876347b400cf2562fcd23e352d2b5e538345d00220784c2435f10d0fb44c
SHA5123409e22738dda5fa14622c6905740700c38b85664e20a5c8d5880158abcfdd3c234ce383d3eb0f32252dee513eb986db95dd16cd2be5fe57c1112abcaa1e2c42
-
Filesize
6KB
MD5d8cea67cc3b50e3cde53a854bda5054d
SHA1fd2b234ee4c406055ad1ac4c821f4e7090bad504
SHA256cb3298700014a8a24623dcd6f08a036cb91d924b3dd14a78bfad13a478fd9c4b
SHA512ec5362fbee933f1106a962d5fe409a80b04d1c92a2c420706c619e0112ba42757e7af4a9825c971107a9e207f39b0bb12a122f0d4b9e88b07d0fbdb9af16746a
-
Filesize
6KB
MD5a872bce330231db2bcf0f257e2481c37
SHA139b9a9d939e5061cf5f06a07d1ba1ae01db16c04
SHA2565885494352885f6cf0bae606364f6fd309b136f5d16e1bd9bca40802af0c771f
SHA5128d7d8e763050e03fb4faa33084f3daf83cdd987508935d0ad021ca9433dbdf0c6d8ab0754292429864330222fca1491b79c440cba2a7a6f54f32189d7e00ca46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD54d4d5efa43c413f2b7e03d5c54afb7fd
SHA1c31bfe6e5ac547a29d46b53b880180fd1e1470ba
SHA2564f744811fd9729fe078bc46d59e732ea000bae4c10b34a70f05b1a88b5293852
SHA5120f4996112d4463fa12492ffc5241dc930ce37f4d050ca199f0e2742fe4dd188bc5c2208ca983b9e46456c1e4c6f81c063ba86206056311535b3466f30d49d842