Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
ad05bcac9671c649be3e6575202a709b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad05bcac9671c649be3e6575202a709b.html
Resource
win10v2004-20240226-en
General
-
Target
ad05bcac9671c649be3e6575202a709b.html
-
Size
237B
-
MD5
ad05bcac9671c649be3e6575202a709b
-
SHA1
cfc433c37e3bc9ed96ff53f7243931b99f4e84bb
-
SHA256
bd10c4d80a6721ec693c9b38dc17ff87edaab38f5c66843091496454e0b0c547
-
SHA512
78914890d5ec0b226490d70565827f334d59b26bab89ca9e9f01cfe5b29c2041416a1ecd56636520a588d2bef5b4e6c7f5a8600f33058271840a7f34bfca5890
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 3648 msedge.exe 3648 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 512 3648 msedge.exe 40 PID 3648 wrote to memory of 512 3648 msedge.exe 40 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 4196 3648 msedge.exe 90 PID 3648 wrote to memory of 1928 3648 msedge.exe 91 PID 3648 wrote to memory of 1928 3648 msedge.exe 91 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92 PID 3648 wrote to memory of 5020 3648 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad05bcac9671c649be3e6575202a709b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb0d946f8,0x7fffb0d94708,0x7fffb0d947182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2412 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1788,4437155596872831464,4245583681162947842,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD5a53221c6ad00e6c913ca4ef6b251942c
SHA1ea886e82ae147fa85488af5e38b82341a223a211
SHA256e02b35b629a3aa2ac1e185232be185fc0dfc33a6a33716d617a818fb63f8e647
SHA5122bfddbe05cea3ab58d331e5c774a7bdcc1f8a1b0ce3b23f84d3a7439a56ed1d5f02f9760e3fb64402900f1eb4d2b43bb8dbf65d9a30bdf27cecd965f17f644ea
-
Filesize
6KB
MD55852b31bc2d439257d47c3a9da8b7b10
SHA1e2419bf9520c2011a6f45de4dea8d721c7eff67b
SHA25658adb5f05decfa552e080946ecdb7f148ca6882ae24737cc4e5ab39d46e827cd
SHA512813f2786e2396f48a1030500a8a42d76ccbd756037d1e9c930a13babec64e3f85588cabf4f404e4724f323a13fc616c62ec53563d842f9d79dc5885c74e8cf8e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59eb4ed2fb1e60b7f880df9fc6e13cb51
SHA1bd4cb4136449ec78d54aa540f26479a8c9ef1251
SHA2569c64c74e261dd57d5c4e76f591edff8e479a554cc5d08d575ca67cf981aa6c2c
SHA51295cfaeb31c3c0edd3c3c7e7441d04e948f869dad2db5e7cb3d393042fe4d87d5e2737ef7186d970bd02191af4f1bbd79c0eb2029c0b787fccc7f6256abeeff56