Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
b7795487d6ca8f2aa792a4caa6cd6230.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7795487d6ca8f2aa792a4caa6cd6230.html
Resource
win10v2004-20240226-en
General
-
Target
b7795487d6ca8f2aa792a4caa6cd6230.html
-
Size
189KB
-
MD5
b7795487d6ca8f2aa792a4caa6cd6230
-
SHA1
fb6404848b9f7985ad510ca39ee152864a0b5714
-
SHA256
5fcdcca12a83b583e0924099b0e9cba1613765fef987ac02c52f3525d96cecd1
-
SHA512
db804cc3be4712d874669fc28c6b70f1be4ff6c0b09b7871a0d779079f99e82879e8ba4f63e7763e14d0136ae18099464fb071bf6f445c63951b13bc03337a47
-
SSDEEP
3072:BJ/qzXP7SZ80mt8zQ6RuJyk5eTI0xCJUZPeQJNZyJb5Qf99//Bqyi8:BJSD+mt8z3wJyLImCOZPeQrzBqyi8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 2020 msedge.exe 2020 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1472 2020 msedge.exe 89 PID 2020 wrote to memory of 1472 2020 msedge.exe 89 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 3928 2020 msedge.exe 90 PID 2020 wrote to memory of 4936 2020 msedge.exe 91 PID 2020 wrote to memory of 4936 2020 msedge.exe 91 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92 PID 2020 wrote to memory of 4812 2020 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7795487d6ca8f2aa792a4caa6cd6230.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd64b046f8,0x7ffd64b04708,0x7ffd64b047182⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4236824446680789770,20516403132345202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
6KB
MD54c3fdfc0ca3045fa5f889fafca059ac8
SHA171ff02bbe9be53612948550ffc8894968f370a34
SHA2563e347452ca4c5feb2af0dd30a4c39de6cd907afda47d703c3f0cb5b6910529ff
SHA512b0c6f1900fc3d1dced15b38a0a779f8acd096bc6835d733fa45e7b832cbcde15c594da60ec37732d2d8d0651ef0a0deedbaee86513e32e87e0067d79f683c760
-
Filesize
6KB
MD5df6efcdda7602c2af6c6f811df162993
SHA187267ea474f810a75a0b73b6db6355afdb8b41c0
SHA2566280d1f854a4a0fd8ab5c098c60a6e131798569065a3d2ea11bfc5d5026f68c8
SHA512fd3188be01be353676926d77d20df1d74b27a3096cc47ee89a1f9d4dc59b70a4834818b371f9a09e4eab8787c9116cbf84bbfad73fa344b28a860b5957693c76
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53dffa1e180e6e83f821b71443ebfcffa
SHA1646c8073551bbd3b57c98949589f0a4815900795
SHA256088c5d128958ead9535202616ce7f74fffc57d3bbb1c2731bd8e5241dfcc6553
SHA51274c12fdf653c7efa5a652fa09b2b2d08c648fa7f71776a505dd6243c4d5c0bb7e66dc61ed0987d2872385327797284c1f1eb6d66fdf0e33ec3db760f7ffa8c7c