Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
b6cc0fbcd5cee43e27071cc49d252271.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b6cc0fbcd5cee43e27071cc49d252271.html
Resource
win10v2004-20240226-en
General
-
Target
b6cc0fbcd5cee43e27071cc49d252271.html
-
Size
166KB
-
MD5
b6cc0fbcd5cee43e27071cc49d252271
-
SHA1
154e9f31c6489f6b9dbb1f643629fffc633d101e
-
SHA256
abe0d1a74cc4b6eb80c49afc844f5a04a7c56b13365d3f905b73cc867002c3ac
-
SHA512
1061f76637d4699cc709637ffcb317fda0eba957a58816de856cdee0e4e1a59abcae6d7ed0a5a90dc314e912887a2d4f1bc2cf6bfbdb4ee9c928b7b312fdcd70
-
SSDEEP
1536:Lax71REfBchUY3mfgTbwUEds6WUK5T0kRRCad5W8uHZZdeaDiZtKsrwOIUb/yyWf:GxZRunxRChr85b6s5J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 220 msedge.exe 220 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 752 220 msedge.exe 89 PID 220 wrote to memory of 752 220 msedge.exe 89 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4868 220 msedge.exe 90 PID 220 wrote to memory of 4892 220 msedge.exe 91 PID 220 wrote to memory of 4892 220 msedge.exe 91 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92 PID 220 wrote to memory of 1772 220 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6cc0fbcd5cee43e27071cc49d252271.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaad6146f8,0x7ffaad614708,0x7ffaad6147182⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11223607688763404467,12354923751800348586,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51c045599cd703cda71b8b7b9314998e4
SHA1e24f9b2bb6931c530d83502bf7f1e08d8c5b1d1e
SHA256ea8bac2c735d811e27eb73abbc0637948f6764dc2dcae735e444d274156b612b
SHA512dc46129ae747d9274c71bbb23934970b4a7d5c669a7c0590aaca700b841de0aeaf146607708833eae6dbf1e309e28032b2d917c95c0a2869e9203b60b83e8629
-
Filesize
2KB
MD54ebef87b77ab88221ad9e18646f47e8b
SHA12a5c139e92da463779e13d82f273e9b4e7c94521
SHA256d381758758bca65d76f77a78cf884472d57575928f1ec8b371c12b0321764844
SHA512e62ae6925c15713261de05700f9016dbb00e45f3fca30922828b10c5ecf057f56ff50d98ee30bc5a57b8ba1ad06bff3ddc20537944f8f006a6657c5da443a72e
-
Filesize
2KB
MD5be8dddea8acd1c180eb762184a543dcd
SHA116154b796185a6d3590cb5820d8d821d1890cb97
SHA256b520bf929fde078ac665a817bb897166703359f73176edc7be2c127a572e68f8
SHA5124ccfc59952fdeb66822b55fb3a925cca62716ebbb906b31a48d112ac9184244c8a54620cabb7e7be993b84b1a2c9dd7c7f8d2615c8362d80ecfd373dbc66d4ae
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5d2b8afa1f102e0f7721915792633f9d9
SHA15260609a1cb833ae32725a20fd6cbfa7b1de5dea
SHA2560b849d668fb1d00c5bc988857a7d4b9332d4937108aae58a003937edaed21a7c
SHA51247cf60345b004e4e99ae303c9eba3f4cf5460a60c006a63bcee129bdc26f5efb3730bc2a612cd207923567055855a5347d95d87b354260c20d980a978480b7c7
-
Filesize
7KB
MD57eade45f864c1bae0c1268028462d0a7
SHA18ed2e34ab20af961354cf8dcb74e0cb344dad132
SHA2565a7add447086c90992fc5051f974f576d097d41fab74002b3de571f5aa3867cd
SHA512bafe765f27cf8df1b015e13d04fe60ad7da9a5fc39c909d38956e433c61944437e5c144e4efa472e9384285596a64b6160fb5d2a3d501a86ad76cb0e9b931ae2
-
Filesize
7KB
MD56308d9835424b111b40756f7fdcdcfe9
SHA10f92fac0c6b6a311d11b22f6d4c602caa040bd55
SHA25630d93b75b412662838dee186cfc2cf44325b3f99343dce5cec1924c8c3a25f45
SHA512f7fb5e58665a4e7d14ffa35bcf1af7389e351c9bbb3ae54fcd01831657f82827ee2bfce4a09105665f5bf6a1863cc7000a8ee8ebdbc4da7fb30d377309ca1af9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50a6f5bd8e9bc9fd1b00ce4ff1810b2f8
SHA1e953fddb52650cae8a65d44cf647c3e8105b49d7
SHA25696f29c4ac6122d28d6371a5d04316d5ad3b3ee03586542807796b721c02c8f11
SHA512b653a92cd030fa21630b2af2be7940043945795d009d72f3d5cdfe3f621628ad9e6226432e10ee6cb7c5ebed9320884415c0ce474761b1d7efa1bfefe6059bac