Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
b7847660b936dea44270eaaca3850e08.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7847660b936dea44270eaaca3850e08.html
Resource
win10v2004-20240226-en
General
-
Target
b7847660b936dea44270eaaca3850e08.html
-
Size
3.5MB
-
MD5
b7847660b936dea44270eaaca3850e08
-
SHA1
d08cc24c1767d776c2a13e375d3e473ce4626f42
-
SHA256
337a28867e3c2251a4a2017eccf75ca3b55505d8b3409eefd8f5baa2956dcbe8
-
SHA512
29f692917191a2e4e4cf766fdf634da023356fba99127e19660f74e7df488e6c0d391f9b14274e2a4424ccdc6a316657094888271d01162f08b41d7bcb3cc856
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nua:jvpjte4tT6sa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 4568 msedge.exe 4568 msedge.exe 4940 identity_helper.exe 4940 identity_helper.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 3292 4568 msedge.exe 89 PID 4568 wrote to memory of 3292 4568 msedge.exe 89 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 4396 4568 msedge.exe 90 PID 4568 wrote to memory of 228 4568 msedge.exe 91 PID 4568 wrote to memory of 228 4568 msedge.exe 91 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92 PID 4568 wrote to memory of 1392 4568 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7847660b936dea44270eaaca3850e08.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa415146f8,0x7ffa41514708,0x7ffa415147182⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4447299961900791877,4906572379520123247,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5400c73b5719c44b6402548121fc5df51
SHA192b1a2b7bc8d6efbd4617ebb0696021c4bf44493
SHA2563140bf8b1ae88f5067d286904d0218029d25ebccf7e41326cf4dda47be1fda4b
SHA512ee2e9dc878248274ffaa0c6e6cb77a1bfce96fe7aa9c1464aca370ee91a067d4ed8b4f25632862fa54e10b0d9a2c4b04d4c26754011f88ededede56e46ea49b2
-
Filesize
6KB
MD52304af027c79b1fb220a30cc046fb17e
SHA16ac6b112579702e7fd1f1c61d37a0a8543b5f56f
SHA256cc91f90740b049b3b96ac4422cdfc31ad3b32b2613d174ae8ada2a0c02f11148
SHA512896da8cbb03cecebcb83f75e1d164226d48e12afd9272028490ec1f252608313ebf6784f7685a94a9359dcbad93e4b3aededa9193393d8e6f8833085ea5376d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b7c1c9d1-eda7-4220-bf3f-1acebd9258f0.tmp
Filesize981B
MD518123823644048a9099144b408ffbc44
SHA1f7b601c35368714844a552ab755a858d34f3f9ac
SHA256b83354d3b1392d3b9c47664227780319817d10506eee3332027c7e668834aed5
SHA512c903e06db9cd7aa07e07571b4411a337b3934409c21afd01fa7bfc3ac57b526709a0cadd7ea859b8f766e7d7c8d42f185a6171d0ca2faa1736e9b1b3014b6fe4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e77f138bcee68c5e00085a99344dd95a
SHA149807fa916783f72d6593e62487baa7df73a8e68
SHA256e73fbf8623213a8794092c74c00ad0dbc32daaeea32d95938dd2bc0080f7386b
SHA51223cef25445e69c4f49aa577dac2a48764965970300f56b172da2cd53359a8fe47e1c0724cde005e178807c3df9cf145db34bee4602a362f759f8f51953be886c