Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
b60486d7426f74310b77f091a6d8f476.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b60486d7426f74310b77f091a6d8f476.html
Resource
win10v2004-20240226-en
General
-
Target
b60486d7426f74310b77f091a6d8f476.html
-
Size
1KB
-
MD5
b60486d7426f74310b77f091a6d8f476
-
SHA1
5f5b19715c9872e3670e253b5f3b1fe3901726a6
-
SHA256
c35aeab2a619a3f5d377583d1232b0632eaaf91a545b3d4dbc714a4171236d6f
-
SHA512
6f46f13f3c270e145e40a859272e60a1a7e0325b50098d64f54bd245364365f6be51ac2104b46b229d85e2b255e41de589a3760aa556b4648f25a1df0be6f5bd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 372 msedge.exe 372 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 2364 372 msedge.exe 91 PID 372 wrote to memory of 2364 372 msedge.exe 91 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 3744 372 msedge.exe 92 PID 372 wrote to memory of 1596 372 msedge.exe 93 PID 372 wrote to memory of 1596 372 msedge.exe 93 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94 PID 372 wrote to memory of 1552 372 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b60486d7426f74310b77f091a6d8f476.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc52f46f8,0x7ffdc52f4708,0x7ffdc52f47182⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5283732125456638431,14053454711089389645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
6KB
MD503f5f1a3c618a0955e6a07e87acd5d11
SHA169cfdfc8147a410b9024bf3da912e1d6af71c5af
SHA256e0efdc513149d34da8472deb11bc2e3e18c35d4da1d581e43941d1df29822492
SHA51228db352dd1bf3b1ab07a8264cee74b485cb54315d6eabaaee6d92d7215765be4db9309b683f2050c142c552555f7f2994a5fb9a53a8efa9e0f00862e6f5e97a8
-
Filesize
6KB
MD5ab9da66617ef9ac87f7b6590e95bd727
SHA1905d3f4ae638bd4152cafee221b89382223226cc
SHA25652ccc4a4d4bced3a3cb9dfefa15df7bbeb16e1604e7bb3f80cfb74110f623bc7
SHA512b822164bf6a55ee8ce4955787c341eb840f68088493a5edfa162e4af49b99dfbc8ad0c68ea79f9368a0584b2f638d5ca8746496af3892674b2df30a3b3f87d20
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD561c115376721bcd3ddf65ee1f0a3519c
SHA17c374d0da8dce57f0dff7e5cbe35cf802a01ea15
SHA25600f3f06ae7051ce0d5f4344d5898bf1b74766bd9cc4c6e21e991d13fb442d1b6
SHA512a66300edc8944a66fe06e208a5ce37aa4d93730470f1cb854cc3a20f6ef66dc2dd790496ea3570be5193b4e75365264b69e8bc3e663f3bffd66a98b7e6404d16