Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
ab5020084ca84cc81a06c3c31e12c5c5.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab5020084ca84cc81a06c3c31e12c5c5.html
Resource
win10v2004-20240226-en
General
-
Target
ab5020084ca84cc81a06c3c31e12c5c5.html
-
Size
3.5MB
-
MD5
ab5020084ca84cc81a06c3c31e12c5c5
-
SHA1
f4f9e96b9ec91d6912d5f51245af69889eebd4fe
-
SHA256
0c239193f54a841e89d02f251b424dbbfc61ee570c22139fdadf97a864252508
-
SHA512
0937a2c1464c272a04bd3c32c770b98d5786c39e8b2f5617477fd70fe05c3a3d4d979af4d30b292696a72cee118929f9977403c41bdc58f760d2caec50d284b9
-
SSDEEP
12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAV:jvQjte4tT62V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 112 msedge.exe 112 msedge.exe 1800 identity_helper.exe 1800 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 112 wrote to memory of 2372 112 msedge.exe 40 PID 112 wrote to memory of 2372 112 msedge.exe 40 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 3696 112 msedge.exe 89 PID 112 wrote to memory of 2720 112 msedge.exe 88 PID 112 wrote to memory of 2720 112 msedge.exe 88 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90 PID 112 wrote to memory of 2832 112 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab5020084ca84cc81a06c3c31e12c5c5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc15ac46f8,0x7ffc15ac4708,0x7ffc15ac47182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5815338096042984753,2085293379710787261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
981B
MD579238c11f4e0dad4e96dd334376442a5
SHA124a7d142b12d35c0dfd19c9d57a45ed4ac221c88
SHA256bd4f258e521aea008fe093008dc17d385f7d7b7739a4c80431fa9903ba821e21
SHA51240f490d90ecc84942bb5da68e0cde7e5e4807e6cd76d101ec1041a2a1c91b3d203c46eea5eef3a92a64664324f2a780e6ddd5312e97a1d9930425b1c85d95083
-
Filesize
6KB
MD5b3baa8364b07f30c05ff2584538505a7
SHA1e1f27019f2c61c527df8fb18f112810ac47fbd0a
SHA2569b6e186d1ec47e452969a403953ce7a4cc502adad746be839285aaa113d9139a
SHA5128c66cc5fb39f8d938be61758b58ec0164acd368a9b78eb2238bf7e024b07c4f6d677864b6e52078d010356b8ffcb6d97284542c17715970fccb2ccb703a83e52
-
Filesize
6KB
MD5968e93bf6626673f65805e2bb44c8c75
SHA18d75ce247eab429fdf46b96164897c36e288857f
SHA256c824f25a084c5e30ccc16dc34507bccb7af32b9c67022fdb4a7f6fa33870cc0d
SHA512ca79c7cb85f64a0ef1b546cf9b44b008a7158326de19c4616d6028d42c01d51812b4947d970a4f7cc67cabb9f26cda8796789abc3f4a4f7ca6e7b66dd19f890d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54a95720d31ff0beac8ba121f5811473a
SHA1eeb6163844a6cf5d6808547605a31035b528616f
SHA256a278eb02f2d46b0ddbafc73d2f128f57b9d6bfbb6121e009bafab2e0156ae37b
SHA51292dad34e6df6f778ed39c2a6c9fd6ccaad7ef48e96fd80163c4908fb7783072db7af3b7777d90623ea614ba44d9ffe43538f6780be93835afd53dfb846778198