Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
b7ed8dda9d14bd740aad93a3f8e5c71d.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7ed8dda9d14bd740aad93a3f8e5c71d.html
Resource
win10v2004-20240226-en
General
-
Target
b7ed8dda9d14bd740aad93a3f8e5c71d.html
-
Size
123KB
-
MD5
b7ed8dda9d14bd740aad93a3f8e5c71d
-
SHA1
0207aae46be4aca73273e73414ddec6008f6957d
-
SHA256
66cd28553f6efc29c9a41b4e24d41b082ff61e5dc0bc403826969b5d45a70da1
-
SHA512
78fcf077d40b30aebdf9af9052dde9566ab776fb3e5054cf44ce14ec1dd201e36ae1669671a55cbca4501945df9eb5816700a4a84211900d3f30aad568ea6b61
-
SSDEEP
3072:A1ezWiI99hbEHhbs/n/vdie1X/bVFN1GXbbY1vlS1xhlRV90ciZTe+iPCb2dawl4:W9as/n/vdieRvlS1x33lqn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4472 msedge.exe 4472 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1232 4472 msedge.exe 90 PID 4472 wrote to memory of 1232 4472 msedge.exe 90 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 2760 4472 msedge.exe 91 PID 4472 wrote to memory of 4744 4472 msedge.exe 92 PID 4472 wrote to memory of 4744 4472 msedge.exe 92 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93 PID 4472 wrote to memory of 548 4472 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7ed8dda9d14bd740aad93a3f8e5c71d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8d2246f8,0x7ffa8d224708,0x7ffa8d2247182⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4038671104340855951,11472661483988935329,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD526f716219922806da6106b749a97d1ab
SHA1507a60c552240b05477005305313a041a5e164ec
SHA2561d91fbcbad2a79918f14293b3fd4d9fadd069175fba9a0f586fa441f294ec07f
SHA512bb75f3c24e10ce13585813b1d1aee922bc2729fe44b835a145c5f532cf7e0aaa6a88aa7dc45c4a24fdefc5eecc8cf64f7c34ac6198bdd47ae26ebae4df907a13
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
304B
MD5e2b469177dbc127fc66a691237101795
SHA1db3ff8b769aa9c66800a4ebb67e394ece0d36dcd
SHA256f04e06bdd779ec741f2c5157121d9a65ff88e3d24c2a80f938eb9c6ffa999e14
SHA5123ea4f9d4eaf9ff00e725372c9de28ef3f56e4a7e7f4c5e6ce5e8e52168ce4a2378e3081f3757394949113cf063fbe9bddb1e042ac37cb8f1af343a327da43ced
-
Filesize
6KB
MD548f189e56da259ee46676b0eff41aea2
SHA11f8841d459074baf2a343dcee0d983a5e4b50725
SHA2563bd14e401d74b82ceed50d0d3f85e219121b03997c90982d060d887c569f615b
SHA512f57e53e426e0499c41b50d2e9032996fda7ddf22686a9a3ea6c6dddd4786d62b68feb56503578d7aa534c4ad27a95ce20656e88639e201b2185b8d2bd978c6d2
-
Filesize
6KB
MD57c9ee37238156e67520efdbe831b31c8
SHA180cd312e2fbd1ed4288859e41a0c5aa0ae2fc5f1
SHA256a100aa83791b58afa7d95e28e70e563bfe96033e191f8557272df3733f72d663
SHA51296357333302d4bcd122282e06e518751e158ce159f9ab2802763feee177c72d770787117595832250dd2c1657676f73e5d3631e38a3da6ba62d7e26c36de7b42
-
Filesize
6KB
MD558097afc3fdcb9bf1c517a1fc41156f7
SHA1694f875724ab4dbf7f424b8bc36e8581b5fcf5cd
SHA256bb50bf76d2797b531ecf61eb668ac1469433545220f60c9888a90f0e6544be84
SHA5127fb365ac8dbc8e6bec1ec26bbd49d082d7d05c378a07fe107d5e2441f430e51386f867eb5c248e2621a0059ed93324a7922c8ee821a04f620bc87d7a387fc14c
-
Filesize
6KB
MD5839a7f2b869da5ad821e28b905e673ec
SHA19b43df8f094b9c81cb996962b3ccadf2a490ae10
SHA256d7b2a8827835a4b84733c536353810f1f84db49a05f46eb941143ad55080d32c
SHA5120cfd79f1ae44be7ccc4660a827e93557f184435fa170348cb8408315af1c81619d03b103d768c3d69cb2d46208584228b9a795cb687a397f453e2166c31f80e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389