Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
b59bbda925896cc481204f132dcd51db.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b59bbda925896cc481204f132dcd51db.html
Resource
win10v2004-20240226-en
General
-
Target
b59bbda925896cc481204f132dcd51db.html
-
Size
37KB
-
MD5
b59bbda925896cc481204f132dcd51db
-
SHA1
c71573daf9d51bb61656063bef3ae0d33e3901ec
-
SHA256
bfe8d2d1123fb158fd9c7d82c0b6e5803eb0299fd9cad7a43e87650c46e8015b
-
SHA512
14a1179761c445167487799ff27ceba0d7709407d80702757b820cf1809d809a6f58333db11731b343e84b26f9afe06d1ae47aa36e7ae94246053565d05821ab
-
SSDEEP
768:/IOa3xSlMnqn6MNlp2uPKOf+TbGbc1XhDG3grFFj4NL6m5W27hrKa5BFlE6oNR2:/IOUSlMnqlp26KOfybGbyhDG6vji5zh3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 2140 msedge.exe 2140 msedge.exe 5744 identity_helper.exe 5744 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 3088 2140 msedge.exe 88 PID 2140 wrote to memory of 3088 2140 msedge.exe 88 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 4100 2140 msedge.exe 89 PID 2140 wrote to memory of 1172 2140 msedge.exe 90 PID 2140 wrote to memory of 1172 2140 msedge.exe 90 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91 PID 2140 wrote to memory of 2040 2140 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b59bbda925896cc481204f132dcd51db.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fff361146f8,0x7fff36114708,0x7fff361147182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16493616161632470492,8204824599204465941,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD51260c6ac1f18d776f293111e99c302a4
SHA14de93c5b399e4de70038271a0f51bb43cfc90458
SHA256a4e154baf5da856442cf9e245dfa5b887627980549aa972979280e9aff382555
SHA512dde5105399ad1a8d1fafac27fb41535b2a4e3378cfada8ff5ffab16b857a2624e20367eb397b5881f0578742bebfd45cf6a1724cb0a33695e206c73d9160e0ec
-
Filesize
1KB
MD5f82a9ba96935dd0480208a6e5ff22dab
SHA1fcf5f06fba4cf1cc50998d2469e11a2a185f7651
SHA256a3dfc8517f4f7234e0d1dc97de320a5e781b2e4c4dbbc7f0e0aafae80cda7591
SHA512e38c95a0ad3a9719f3358704a134b140051b60855b4a2c59f7eb74bc4a7dd8067f2962b26a27de64133362ae7ea68535d591efb39615ae1f33453b15e3d1344e
-
Filesize
6KB
MD564e627770de5dd0d7db6b4e559c49d0d
SHA1d411379077bdcd61a176dbb51965debeef06bb11
SHA25615fa01fd27490fb792965c8e24e414406b93f0c26b0ec86afdbf22d82f19599c
SHA512d0611ad5fa0ff53c2180919b2163cf91e2cd94581b500da3dfbcc3f37545c2139c8bf75955714ccb5ec91ed93097306553ea0b96a060b2b556e7f43cff2f498e
-
Filesize
7KB
MD5590d069b7db5994529cd7a4b1f70100e
SHA14e77d1f078cc742a98604336005e9d275be55fdc
SHA256cf50cb6e96badd17003d597ccac8a08357f8a1e8ea3b6c3f0331c28a2b6bb9dc
SHA51273b4b36e07608498af61fa4646f5e9aa79784e6ba66577508363e0fd06b481398eebab84ca70d821d054c998d7594e3d9a13a013a81024dc8cbc794f06ff94e7
-
Filesize
7KB
MD51693fa06467e07af7643b478ecb315fe
SHA1c30b01b9307efd0581172577da052be9d1a4b1b1
SHA2560e7ba0e8b3e9a4fd83ab3b8eddd3b68a9a5cbfb04d4157bd7ab3d8a4c90f1d7f
SHA5122cbc9b288f9a303e25dbdd598c23fed80b70ac557d3ec8748e3379fac22e3cd4c374e2fe8c81537670fb31232e06b075e29d6d1f46b0c24354366c8e3e9467ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD587755ec2533aba0330df45d1e18e5774
SHA10b67fd870f3385a0580527e5429f52d80420311e
SHA2569c22981e99d0037aa56c7e112cea303d82854ced5a5d3043f431a4a0d9112931
SHA512bcbfd090d6c61fb269ce3fad5e27fea9ba042caf18e6470d67021037a4d8033eb67295507520e773b9e292bc6e36c2c292ce854a40396544dac86ad362203153