Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
b6714f1206188e14c67a693120ed5a59.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6714f1206188e14c67a693120ed5a59.html
Resource
win10v2004-20240226-en
General
-
Target
b6714f1206188e14c67a693120ed5a59.html
-
Size
34KB
-
MD5
b6714f1206188e14c67a693120ed5a59
-
SHA1
72fbc1007df890a7ecd2e3ddc50dabf679596c8c
-
SHA256
cac35e556b171935b3e07c761cd4544c489da08de9a10c9d7d346da1737be7e6
-
SHA512
64efb35e4a8297816d905b656971e323b9cb9b6301bb133007ac7aaa7629d798ca884061d7b45b2e42cc394e12868349ee73166a4b61402da971ae22aac0bca0
-
SSDEEP
384:E142YnPz7VRNeyul5Fl1QX43Yim1EzDmSd4uEfDCQnD1OrRFVOprxxnFO:X2YL7VR0yalWXm879IOLxnY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 4284 msedge.exe 4284 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 5696 msedge.exe 5696 msedge.exe 5696 msedge.exe 5696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 1196 4284 msedge.exe 86 PID 4284 wrote to memory of 1196 4284 msedge.exe 86 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 4780 4284 msedge.exe 87 PID 4284 wrote to memory of 3692 4284 msedge.exe 88 PID 4284 wrote to memory of 3692 4284 msedge.exe 88 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89 PID 4284 wrote to memory of 436 4284 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6714f1206188e14c67a693120ed5a59.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe691246f8,0x7ffe69124708,0x7ffe691247182⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8206176800710807548,14939099554372845641,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
607B
MD5b9fc24344d52e81abf9055732f907da7
SHA1ba166a91589c9bc281a4ab59f0eccc31009f9bac
SHA2561da06df4b57b58084b51d61b205dcce0795093a4cdc9ed1a3038505de22ba2a8
SHA5125bd6ea8c7d9349bed2a1cac160e66cb9481b0b6e505c60f998499058843d55fc6683044ca434a2bba4bb616a356bfbeff0090a46cea0bd1ecc57e75a20bd90e3
-
Filesize
6KB
MD5f104ca367cf221c1da1e1d63cfd5ef15
SHA1ef48be8c900d96692823b178ec832300b26c7899
SHA2560fbeae36de76329a47fbae3919a25f390120352379c8834402be8994225464b3
SHA512fbf841a0b5468efc2d8e27a45106b75a3aca632b4fc9edfb646688ce34b4397f5fd2be25ed799ba0533d3ee4a4d0f68053ee094eac55905055ed301afcd9eb3b
-
Filesize
6KB
MD5a56b2a8c846524eb3d69e6d577b9d528
SHA11eac03af957150826ebbc013a7f449261f0bb8e0
SHA25682183d457281755cf9c9523c6f8212ed5e5180a609b8dfee7156a3a0d27a3ee6
SHA5128ac1c481305083ecd4932e07fa9e5d6799684f6e2941f82efc30acf422aa12eaad979faa11259b3499975cc9a70212a339710dbc5d3587368809b986e2982cb3
-
Filesize
6KB
MD54b25211e72515962a005ccd9b9bb6020
SHA18436f3968c2010ddb2a0ce6fa9b968eaa6dabf7e
SHA256adff7a76abeb268c95389bcab4dcf787d414d4463527736c748db02c88be4bab
SHA51200bc238d91ff5551c2bfcb7d83d22431ec5cfe0b2effd5e6708717ce77e2da3ec7bff2b7eae0b99bd5751dc1c530ee63b38ce904cd0063dfdf915912f3b8fa96
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5953d4243cb02f51d8aa7d03cd9c26dfb
SHA17e73db24fa01762cbd99e5e3f8f31be71bcc985e
SHA2567ad2bde3d92afc1ea9c6af321dc17389ea2d7317e419f3c424c7465b1a71cb72
SHA512a3cf540f8f1b0fee7eccd5fdca7fbca43edaa7d06b54d6b8f4cc1ec2181fb334ba6f1a006ac923ea929b0ffa4b456d611cc074f9942c54d7ae09954e861ade0b