Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
a37aea16ed63675d62303869e094a780.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a37aea16ed63675d62303869e094a780.html
Resource
win10v2004-20240221-en
General
-
Target
a37aea16ed63675d62303869e094a780.html
-
Size
12KB
-
MD5
a37aea16ed63675d62303869e094a780
-
SHA1
bc558f9a42a2a2abbc192e74afb3f011a624d3c2
-
SHA256
14dbbe529a72e61f781e47cd3404d353df4d7644bec9ffccb1e3fcaaf7070312
-
SHA512
d2c9f81ae09335488fd1423d7cd399ae548d0edec646fa255fabd2468058de0ac89db3215353e7a441f2cb294123c3675c53d26fd88f97cbf48232d14dc29b39
-
SSDEEP
384:xy1R1QREDBeVliOfwvU2ee7Io48KXwRGY35kCPRrMO77OM0TCtxYLuZ4mXYHbw9J:xy1R1DeVUOIcz+Io4QV77OnBK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 4564 msedge.exe 4564 msedge.exe 4824 identity_helper.exe 4824 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3652 4564 msedge.exe 86 PID 4564 wrote to memory of 3652 4564 msedge.exe 86 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 3276 4564 msedge.exe 89 PID 4564 wrote to memory of 924 4564 msedge.exe 88 PID 4564 wrote to memory of 924 4564 msedge.exe 88 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90 PID 4564 wrote to memory of 3328 4564 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a37aea16ed63675d62303869e094a780.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xa4,0x108,0x7ffe8a9546f8,0x7ffe8a954708,0x7ffe8a9547182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18212148193415775436,698075672113439493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4db60c9bb06ea5452df26771fa873ac
SHA1c118183a1315a285606f81da05fc19367a2cdfe1
SHA256f168242e74bfde18bacb9e18945a39bb447188eba916c7adf0f342ed8d82281e
SHA512180ed98f9d5a14a22687a099c4a0ba6b586610f7b8b4c8de89f3b91713b07a2ef3726fcd318cb4e270b1745213b898037d29cca4b490d0c91833b797d69ac406
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
Filesize
6KB
MD59a63be41f3bf38833ee2ff05ef830094
SHA1d82042d102da4eb24a543d4054ab2700ddd75b59
SHA25665053a844065fe1fd06d52055d44d9c92ea8a268556626fa5767e9868d463a6e
SHA51272fd07f7c0d250c79e5e8887cec201c42636940aca79c5ece7b957c69d83fb150fdf2be859fac6f6651354a8b8781d1125466aab3c77c906d4a6de0c4ca5d9d5
-
Filesize
6KB
MD5418c3a317b664a15281e5bee36e62add
SHA1761ac621e728fc7741eaa26177f0cd485462b9fb
SHA2569c1ac34eb81f59ee331f904588436f54699f52163ed19c252cfa5c4bb6087b02
SHA5121ef7b8d5fc7962563ee266f808efd4f19d5b6c84b84654866c66e2c5ab356b3d207c89d81bf72609106a6533ab330beb9214374ef83662dc2725380cfa33830c
-
Filesize
6KB
MD50a072c34efad396784f5fd470e418eb7
SHA19c08162f816a7b7f743f75b6a9d950477ed92e50
SHA25627690427c0e4e0204c1933f9c7765d12cc16a4ce6a9556e610694525b7125e2b
SHA512222318d974e0f5868ca86bbfdd460494ea4f0cc0fd7471181fc4a7d296f2e9910b9d2e8f646336389d637487c7f813ee84aaf8dd6487333e6fec9b1c38dff2f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD529a68d4f22ace32f2d29e72df268d064
SHA1bb3fb5e9ce2f67083e900d11d649d879da90ff39
SHA256d8880eb132be1ffc319bb4d5f1cee51c69e2a679e29a8b7eb99d6165bb73730a
SHA51257ef4cb003caaf35def38428d1fb56c0bcbe695f2bdd2ef46b70611508d79a1e198219a8de14482e5fdb50d6c84d6388252b8d8c397017e98fe6e25d5bb76328
-
Filesize
11KB
MD5bbac564eb6997e013d8cded44be6ebcc
SHA1e8b5451fad11ed7f199839372cdac7df02aa03d9
SHA256fe4c0b16454c70b480bca01ce4c76b959581e808f3a6fcaeb6b28c2a0175cdc2
SHA5123e289d3f54ec787ba5099de6ee1dee7de1072406ca1e7ea843ca85400bb20ab8d936dbe7f06544abdca6302e3a2eab94cae618dd68041d583d1108c5489e2289