Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
ae11b02f0d15d03882d57f1d6ac5b719.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae11b02f0d15d03882d57f1d6ac5b719.html
Resource
win10v2004-20240226-en
General
-
Target
ae11b02f0d15d03882d57f1d6ac5b719.html
-
Size
594KB
-
MD5
ae11b02f0d15d03882d57f1d6ac5b719
-
SHA1
e770b13b1e2fd0faec2f051219a5097b2f8828fd
-
SHA256
c5163ddde268bbc8eff11f4e253db4499e20788df988f582c8cc2b72a3adc89a
-
SHA512
aeeab9045a428d0442906f3d11e001254521dc93665fb97bf1459f142ee291a8b66a3a9533becabcd657116d54edefe440c71f9ecc9753f3944e0e15c940c21a
-
SSDEEP
1536:NsPuhuTFpcW8ekhhqZMDQU1ZJgL1bsKD72sSZkHbaulOiGA+4TJwhFiFt7BL5d4s:NsPuhuTFpO/g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 4816 msedge.exe 4816 msedge.exe 644 identity_helper.exe 644 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2284 4816 msedge.exe 25 PID 4816 wrote to memory of 2284 4816 msedge.exe 25 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 832 4816 msedge.exe 88 PID 4816 wrote to memory of 3232 4816 msedge.exe 87 PID 4816 wrote to memory of 3232 4816 msedge.exe 87 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89 PID 4816 wrote to memory of 1448 4816 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae11b02f0d15d03882d57f1d6ac5b719.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9448646f8,0x7ff944864708,0x7ff9448647182⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6250697224481980941,7120960361497072276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\80a9c658-cc5c-4094-b9c4-fc697193902f.tmp
Filesize37B
MD5661760f65468e15dd28c1fd21fb55e6d
SHA1207638003735c9b113b1f47bb043cdcdbf4b0b5f
SHA2560a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e
SHA5126454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c
-
Filesize
257B
MD56edca6da5130c768f823ef28a90027d1
SHA170c6026009dfb8a6ed66186cab6537f5b799bf46
SHA256100f6f57c8f5a39979ac120d5d5c56dee06d56a20d7e59e848ca97dc648178d2
SHA512399ac03a157db8117467c7e1204b58f17ca00543824f18f372c8550b8a007e1c17825af2e95e0666f27db25a3c2b842892cf86a711bfc545f6c7b5015999ef03
-
Filesize
6KB
MD58428544a7e8f7f326f18911824882191
SHA1b318c623fead1390bdd315fd9b262e7f5114c35f
SHA25604e1f531e91736c1380a51504c7f1baba47aad9c988eaeca1bae9365f7fffd6a
SHA51260043427db6ae7f2ed978c990e407320f44b81d8eab4c42100886b257b72acc030818597392516ef20742678c4a569d1f39cc918cef45e1ed6babac80be7a96f
-
Filesize
6KB
MD551e1834b5d900c9ee9c54a2f913f8a08
SHA1c2e90633df474daaf16536eb844a3bdee464aca3
SHA256c80a58fa2872d2c1ec09baa07c7fd121ed1640b7aade239b26cc37d11eba7c10
SHA5126cff2bdeef1931e89acc86f1b80d53ba3d2af91fd362496bcab76bd4b01ff41e817324f0620a444482a6a6c07afb1f8aa109875e835c73d69f446f03d6534606
-
Filesize
6KB
MD51adabc0cb2c8e335f3cebc5d9f054925
SHA14492aa725bd748e6b6fa6c857724e3f302b6e577
SHA256af3d542074bb9cb4d27c08f4ba148d37a0a1714248403e71f11a22ef88ae1f4d
SHA512b420f433dd97cbf9bb8ec3bf5a1a0ed3d7fbdd3b7a8ccc3c06cac362307739eca936fea8345b3773007af27049fff6f0886d1f38798a7dbf309f446f06349a57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD575be90fa4bfba7c698efcd9a5e634797
SHA1cec94f7099f5cab6baed7767721480904ada0ab7
SHA25639bd739786c0be350796d7dea1bfc66be6bc8e149821a6e42f47715d88e9f4df
SHA512e1cf07f0bc5944d785299cc243b36bb94fa8e67848ec104200f348e5d28ed631764078c7848e65c06a84794974b25c7701519b2e0e34325affc2119e8771634a