Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
ac45d66526cdd46c3514e9ae32d17918.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac45d66526cdd46c3514e9ae32d17918.html
Resource
win10v2004-20240226-en
General
-
Target
ac45d66526cdd46c3514e9ae32d17918.html
-
Size
77KB
-
MD5
ac45d66526cdd46c3514e9ae32d17918
-
SHA1
59c86845f849a2ae8417c5f8adaac0cbe42aeb4c
-
SHA256
54da3070a575ef9b4e498ecba31516f5c133036bb25e6ba0491376b66d2b4167
-
SHA512
943fbab1d5008cbe7dfd7eb27f67d8a082ff2e7c5ece4627683188e544fee7cfc832cb12ae128ab3c8c931040be7b4d8dc48e44475605406b41ef10914346395
-
SSDEEP
1536:zabquklcMklc2klc7uG/bI+3zkcKklcPEijZeqhUEijZeqLyWf/UMVvLIWl7mEgw:sklcMklc2klc7uG/bI+3zkcKklcPEij0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4288 msedge.exe 4288 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4756 4288 msedge.exe 64 PID 4288 wrote to memory of 4756 4288 msedge.exe 64 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 3448 4288 msedge.exe 92 PID 4288 wrote to memory of 4888 4288 msedge.exe 91 PID 4288 wrote to memory of 4888 4288 msedge.exe 91 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93 PID 4288 wrote to memory of 2028 4288 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac45d66526cdd46c3514e9ae32d17918.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff952db46f8,0x7ff952db4708,0x7ff952db47182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3736596663314996928,873748048404220107,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
1KB
MD50d34f59db8fc8999104da371055b0677
SHA187415fac4552aaf0ff4daba548c2eecf21418063
SHA2568abbf5a514ae4f6859da284030ae688367691993863c33d4051829bb017e12e5
SHA512ea4a25069988877cea479fd6372e1c6562fde991831b1e813c8b1ec75c02275a8a95b2ec1821ce6f2bfb64ac153c92f839e47e961533f2a58e255ddbcdf9bff4
-
Filesize
6KB
MD54e4c8dd982f111d7b2d85876206c6bae
SHA165f04e0954c37a698c8acb77d364e6995c1bf2d8
SHA256c7ebd92a0a7b9d3f308b074698ff749388f34e9911cf98298863aef45f09a64f
SHA5129b2e3bf94d9b81111dfab46fb664309054beb6f95144531cb1844bd7141b7b0b4267bfc0dd14ccbc24b4015427ba6d5379507c75503fad1615ff6ddc9ce3d491
-
Filesize
6KB
MD5b1308eb3db9bf276b6b120506142acf2
SHA1e9dc602acbdd9d79c4ff0bba39b51210db52e0e8
SHA256bf6cdafd8d2df2922a180c4e60fdff0f3042202d7697dff857a710bfc1484359
SHA5129a61a087491d7d99dd39e6d059464382c3f5350983c0e98b8d945871c776a5932f85b04400d69f6ec5b346ac796d584053ee73800f191a44bccd17638f4fff23
-
Filesize
11KB
MD5899b06699b8f3d59ed7411bba6cb74e5
SHA1b40e81a65cc2339e8ac16445f8f48db4bd4567b4
SHA2562c7b1968e80087884e1b4aa031a3e02ad188485f0668d71df34643071dcf7c8b
SHA512dcad020f29fbe2737953b74533ad6896d00e6d079e5847b38c91fb23f4f9617f750cf7af1088cd4008188a7a4b3545ca5bd7f0e0928436cc48b28bfbf169c4a3