Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
b943fe47fcb43b1e5f32c61283bd8a57.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b943fe47fcb43b1e5f32c61283bd8a57.html
Resource
win10v2004-20240226-en
General
-
Target
b943fe47fcb43b1e5f32c61283bd8a57.html
-
Size
27KB
-
MD5
b943fe47fcb43b1e5f32c61283bd8a57
-
SHA1
3c41b269398f7aee2df03e8d64400e44f0fd0c2a
-
SHA256
13bb5d0184fdbbb5372555eab5177144ebf19c7f3831150fec46ae10922c4b82
-
SHA512
e6759d7abfc8faedc94f2524e15c3909bfebb882e6799f05717a493c325606d28251343ba67fad3fd823a7d94e8a41960e8c74075794a9918bf2f26e355bf1cd
-
SSDEEP
384:fKylNskpmyMlT1dGxByIDlujjH8f2AGQpAaXsUnQFWbeEfAwJDRBFLN/4RNhXtXg:hNskp2lbH+2ivXseMWbeEfAwJ/D4RC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 3696 msedge.exe 3696 msedge.exe 2084 identity_helper.exe 2084 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 1780 3696 msedge.exe 89 PID 3696 wrote to memory of 1780 3696 msedge.exe 89 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4864 3696 msedge.exe 90 PID 3696 wrote to memory of 4112 3696 msedge.exe 91 PID 3696 wrote to memory of 4112 3696 msedge.exe 91 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92 PID 3696 wrote to memory of 2028 3696 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b943fe47fcb43b1e5f32c61283bd8a57.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce5c646f8,0x7ffce5c64708,0x7ffce5c647182⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,612655131268851135,13610503608884569836,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD59f0204c44655062697ec99adce81d0b1
SHA116190b6c183c9d664cb881b3f5602498362dfb8e
SHA2569d68ab6bba7bcfd9740fe78a113efe3385bcf89d38a597391755e72d0a4ae35a
SHA512ecf67792f6fd76546d0f9069a16b743f7d5ac963b0ec6d120d7147043869995b12686168e5d2660a136bcbde297ea82cae5b5128206f60dfea7a19ca0fd2bae9
-
Filesize
1KB
MD5c8fd62e05a477f032146f8ac2ac96a8e
SHA16faf31aa165574ad982d7d7933d39451caa50645
SHA256e0cdb2ba43f6dd691a30f7223a9f678fbeadba5bd855724c034f95bead0f3e49
SHA512726e92fe638aec1a78df29434755778df3e2f3e747956bfcf383097193b59dc004ad8ea04a090cbad420006bf51be7d7fc1949c4df0497d0f0f35f961e7b950d
-
Filesize
6KB
MD5e6ca5f30f338d1a7902867604f583574
SHA13bafa7328ffcfc60f005ff742d4cd9133ced8cc8
SHA256e0c34c9506fee97e46fbb600423fa1555d32b7a207de83a148a8b0cbfb2a2a84
SHA5121a54cb4f68dd8d21875f0466a4f71cc86109a5205eb5a17d3a8dc1b9b250c8ba9fb37e59c1a410dad0fa5d1a89d2663690ddd0bed4e6a590a45c0ba23148cf9f
-
Filesize
6KB
MD58202dbfbbe8611c995fd85d33adeb34d
SHA19b7c67e6f6a0220e3f53b525af5ad1cb99ce9f47
SHA256486232857e57a867dbd9506f33b7b9acc62472662ce7163a551648c44322c7f5
SHA51265dbdddd9e884233d78a12655da1b988321d7f459a582448bb62fc69067469abdd7f76c047dae393ce991a56d1a9f74902c267d0a63c1125ba2a97a9f8e41cec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c942ca5abc468bde9a9eac323c1a935
SHA1d76c9d06b1c153c5c02af664dc129b5f858cc57e
SHA2567e7a9d2146d64837cbd44091b6398287e95e65024d8e714266f6965a4ecd29ba
SHA512518de91fdd6cd4e13e21eac2140ce55b39b188693b90dab5930494ec2bcaeae232fde7fc782c0ff8cc5db4e7c12d23971c269402a8b3a6d2013d6bbc14611962