Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
b4cbdab1b7b741b18a05e05d9a36b5ec.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4cbdab1b7b741b18a05e05d9a36b5ec.html
Resource
win10v2004-20240226-en
General
-
Target
b4cbdab1b7b741b18a05e05d9a36b5ec.html
-
Size
12KB
-
MD5
b4cbdab1b7b741b18a05e05d9a36b5ec
-
SHA1
10c918ec5398d100e94a47d5b155a25bf40a4aa9
-
SHA256
e943d5a78e8e7c40fdd5779498c76e5b76d380e7b50e6cc0744c7e28f497af07
-
SHA512
2f66ee577fa18443d77190e060905e00fc86548088e731383b728a16b7d00262049284fe16d7a52c107085af09111abfe1a3aa45a7e38f5914ce881652e9e052
-
SSDEEP
192:2VklIsr0KXyJNVCIN5q/8k/w1wvqVkZEBbZ7np0qRe01LauBuLbdU8d:sklIcwV1jqZ/gYEBbZ7np0qRe0LaguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 2636 msedge.exe 2636 msedge.exe 6132 msedge.exe 6132 msedge.exe 6132 msedge.exe 6132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3836 2636 msedge.exe 89 PID 2636 wrote to memory of 3836 2636 msedge.exe 89 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 3536 2636 msedge.exe 90 PID 2636 wrote to memory of 4616 2636 msedge.exe 91 PID 2636 wrote to memory of 4616 2636 msedge.exe 91 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92 PID 2636 wrote to memory of 5096 2636 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4cbdab1b7b741b18a05e05d9a36b5ec.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8c7446f8,0x7ffa8c744708,0x7ffa8c7447182⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2271409301542454542,17606208862045445648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5c0887902c4976e705d813069566eab6b
SHA1907d1a9f897fe164c75f87102de1d8783ecd92a5
SHA25682066955ea97ae21794095452ee9cd7a2b5ac90cdb00779f8bb9ba845217ab0b
SHA5128b69f63498cf1c53e7a2dfb331addb7fb2cd606886f9c51d7a3bc97daae042da18ced23aede680ae4dbdaa2ec22cd4b1e24307f35d7cff1f62972c22a2df91f3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD55a1016966ad7b89a5f3ead6448563dc9
SHA1836a789792b6002141e7a647e543d41d07d9fd92
SHA25696337d7e62eec1f9aa621484b3bcd045dcebaa1d2a2674456ec8e79e41442879
SHA512513ae1d7a0bfcb8ff7955c8fbf9a76512df23f709ea87410fe6e3713de2a8eff4315381391d2401e31ddf7ee720f2a1501b69cc8429acfc1cff9dfb259327f48
-
Filesize
6KB
MD561499bd346caec5dfb64c72a7b534dc1
SHA11e3e2778ea07490cdb9f29d9ba0ae7dd016340df
SHA256351b70f62e596ebecd7c583dfb3cf5d4ed2e0a557f46082204720e9a50d4ce57
SHA512c7beac3df17cf482fd1040a63cd22a20c6dbdb15cd671954c2249ccd44ccb72f5e4f2f21d0fbe93d995e0be578509587290033a4a2e6a5ea5f23079dc3889704
-
Filesize
11KB
MD5511139409051829bce5966d8b5874bcd
SHA1e83e5e2790a142c5dbcfda95a9e214fbbd3194d5
SHA256689506210e0e40cef930a4900b7d9549ecac3c6a4a70a145d230c8556f5e2dfb
SHA512717d648a629a1f538e2850ec280e3cdef9dbf816f446ac5008f13206dac59c252a0330687f644afeec213ccc9bc63cc7075f7ccf9567319657d3a4b0f3838969