Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
ac987e4ea0573aa84fa42d3e050c35ea.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac987e4ea0573aa84fa42d3e050c35ea.html
Resource
win10v2004-20240226-en
General
-
Target
ac987e4ea0573aa84fa42d3e050c35ea.html
-
Size
1KB
-
MD5
ac987e4ea0573aa84fa42d3e050c35ea
-
SHA1
569e9e96d48808ffa6437ac2f52c75f3220a7ee3
-
SHA256
0764d1c167e1d11d776e2fe2776b266815a0d4369075f1ca53a3051e86d8d2e4
-
SHA512
c7defb81f49a33e232b5d6b96a14d178206fb8b762dc9706027ab258ced2a537b1f7ab9c9ea33debdf5aa2aa2b66cd651b435bd65e8db90ce81146401135e172
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 3352 msedge.exe 3352 msedge.exe 2964 identity_helper.exe 2964 identity_helper.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 316 3352 msedge.exe 54 PID 3352 wrote to memory of 316 3352 msedge.exe 54 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 4140 3352 msedge.exe 90 PID 3352 wrote to memory of 1892 3352 msedge.exe 89 PID 3352 wrote to memory of 1892 3352 msedge.exe 89 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91 PID 3352 wrote to memory of 2440 3352 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac987e4ea0573aa84fa42d3e050c35ea.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98ee246f8,0x7ff98ee24708,0x7ff98ee247182⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11712174271151717639,2261037210285216395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD51f199bee14946aaeaf10bec23789e613
SHA1fc6ffd0e705d51d27ee318f4fbc91067344d02ce
SHA256b9439eae142ace3223b33bd732779bca9e7a05405d934745b326f0d3d0febf52
SHA5129ff9eacff3f9e4cf54921bfd5b234129188c65980cf4d055b1ab9716ec8083521ed224f5ce2aeb3240f195d9cae22452ac139823863e3802c309036c9d5d8d0e
-
Filesize
6KB
MD5a0343a8dab6db8a5240549a1ed235cf5
SHA1d811a9fbe3f4557d134a70cc1db72d34180aef1d
SHA25622ca29e9e72264fa1ff5fe0984824b233a445a7e2a918c23017d0c7a2d948145
SHA512ccf76ec5338986202df4913652d9b8e131feb93460a828664b44e0746711d9dd5af8f6dc31d51f6b16702ec7dd015fca0b12d51eef2a906b9bf3fc8cc551234a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5c5feb67302c96172554dff381bf1fe2d
SHA1aec194d14783a073694bc0b2e8b218cb606301c3
SHA256d3067d2a90af80b1f2565f853c6a18b17c989276740afaf60bf3c82e51f1d62f
SHA5120e92c8923d2f9975dcabda7ab8d2566eb6168120adb88463b6399faca215f2928644f589d781d8ed43c84de028632c6386accfe201987be484f08aaeb4709860