Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
ac93f8592df96f593edad79cfecc42bf.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac93f8592df96f593edad79cfecc42bf.html
Resource
win10v2004-20240226-en
General
-
Target
ac93f8592df96f593edad79cfecc42bf.html
-
Size
601B
-
MD5
ac93f8592df96f593edad79cfecc42bf
-
SHA1
9c530b8518b032fb4fb68d678674ab5afb650ca9
-
SHA256
a99e6d88b3274adfda7309ae011ea5006976e51487fac4ff7990babb91333802
-
SHA512
95839c7a9e6f3dfff5fc7cff0d2723e3f09a1d1fe73760d7c9474df2a300d7aa44af22b455e775818782f7c87923cd995406df273ea54288365d9cc7da848b03
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 msedge.exe 400 msedge.exe 2852 msedge.exe 2852 msedge.exe 4952 identity_helper.exe 4952 identity_helper.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4944 2852 msedge.exe 50 PID 2852 wrote to memory of 4944 2852 msedge.exe 50 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 4788 2852 msedge.exe 90 PID 2852 wrote to memory of 400 2852 msedge.exe 89 PID 2852 wrote to memory of 400 2852 msedge.exe 89 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91 PID 2852 wrote to memory of 2064 2852 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac93f8592df96f593edad79cfecc42bf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff897b846f8,0x7ff897b84708,0x7ff897b847182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2103129706689230176,3729586938337069876,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
6KB
MD5113154a88be0d21bd33e92a47be1ea43
SHA16818e7cbd3c5a487ba2bc15c67293e410af250da
SHA25674cffe23a0aa8f5a44c93f41eea9bfa97dcb360db1c6bae595bbdf2cdc6fb3b4
SHA512543acf1fbebb65310f611694d92d0b739d371f8fe73e876273a3dc4823126ee623f573aaac8e639944ff576379b5b65ed97e900bbe48fc4a53c1b291be589bd8
-
Filesize
6KB
MD5d7b07ee38cf3e814466f04f2c09344b8
SHA17ed520b3e22e774df4c19f9eef8621361bbb8eef
SHA256905c9a529dd4ec5fde66b904a897f7b6994e8bfd17fda44469fea6c816a24fde
SHA512b9bda48166e9e4b8c5ee2bf4e8585b73ab1ca470f63977b64fb28cc771a9e63afa952d1602ac68231613b5b577827030646baa4d3a28d3781e06af908b337f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d21c40a0f852c2994e8b1ad932d5dd5
SHA1344c84936af736edb9ed2a833a8b05a0f431b82f
SHA256bae59006cf3875f68a865ac5186568efd711da49e92802aecfb3dae1a7f97b1e
SHA5120e9e5910493be5085c4502bf000ba9dc38abf84dc00c7a4de361ed1e851858e1716099962cf36b54cc3e80da88f16173ea2e825109564def297bf73f3138c298