Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
EXTERNAL - Trma Kreedit -.msg
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
EXTERNAL - Trma Kreedit -.msg
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
UTSO.zip
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
UTSO.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
P
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
P
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
UTSO.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
UTSO.html
Resource
win10v2004-20240226-en
General
-
Target
UTSO.html
-
Size
371B
-
MD5
5fd12e1425d891822bf24ced15e33f04
-
SHA1
ec3bed41ba4a4d810ab47aa8d48e4ec34cfda1ce
-
SHA256
dd33591ea39d16ec7aa18f328cf96871eed3ffb1b8321342dac28c6e8309206b
-
SHA512
7bc37d676d0e7a4693f5a3d36d681b64a771fbf2cb685bd8335ff5a0b428af50c3ee97565693dc64f2bb2dfc1e3c20a2c9352537dcd40d919f0ae4d6c5606f2e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 2656 msedge.exe 2656 msedge.exe 720 identity_helper.exe 720 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3316 2656 msedge.exe 51 PID 2656 wrote to memory of 3316 2656 msedge.exe 51 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 4880 2656 msedge.exe 89 PID 2656 wrote to memory of 1636 2656 msedge.exe 90 PID 2656 wrote to memory of 1636 2656 msedge.exe 90 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91 PID 2656 wrote to memory of 4324 2656 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\UTSO.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb867646f8,0x7ffb86764708,0x7ffb867647182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7576154656367687141,14503756024702411574,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD5bbd8bad2ee6a70123bd68e150a3a42f7
SHA156c58975483b902d92210a139391148106d620c8
SHA256dbfde80ec1a5618222e60d75e7d36aac7c20663693b9a6f1446640aeb9cfcbe4
SHA5127f81d2189f100b93dccc4539a7fb1946f38d94a7fc852105a3a224f9006d3176b5d3148386563b3aa370f90265d2bd233c30dc98f4afcbb7b457ab0af1d08242
-
Filesize
6KB
MD531b77715ec47783ed0a3e4acd9bb1b70
SHA19228b23f9c1a25a2573add97bd16c3072f11ab34
SHA256643859f50410181cae8f6cd348631214ccaa3f654d705f58b33f778b2710c68b
SHA512d412ba8655a3dd3fe643423a4bde74b9542b0797eea458147593d9081da972ee296476365ca2bae1912b906b9066d5fee720a36a105cbd670baa932dd383ad8e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5add13544a05a8c57423bb5f631e7e938
SHA1f3986cbbd0fbbff75dd20a6d354b82a16beb0484
SHA256478c9dd425c4d9637c0867bbfd084676d1091001b8961813f6d1162c1c594222
SHA512bf6bcc58bf548528b94ab8c95fcabca3fce4302ea550c3e1b487be4a18cdbf25b5612e2d9ecc992924e0f5851498b8dab44babe059cd3812f3dbca2c99ab6074