Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
bb0b5999491ccf3976bf299da9f01cd6.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb0b5999491ccf3976bf299da9f01cd6.html
Resource
win10v2004-20240226-en
General
-
Target
bb0b5999491ccf3976bf299da9f01cd6.html
-
Size
89KB
-
MD5
bb0b5999491ccf3976bf299da9f01cd6
-
SHA1
3d291997af4b7d7a40c7f9cfd334cadbf31d4771
-
SHA256
e29f7b0a255e390be2d2b542c2899a419f83633ef8785135218d5514a13eeeef
-
SHA512
2494c188fc41b1a58d5f61b8251fc10bdf6be457daad89bf2f430c089e1d27fca571aa9f9f6b6ccdcbed05d1ae16a203f2ce0858a1d08fae87517032f0be6885
-
SSDEEP
1536:gQZBCCOda0IxCWQgQrz1dVCUeQ9HoOClm1p1MM68449+qnGZeWGfPxevz0mh1k4t:gk2M0IxDPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 4444 msedge.exe 4444 msedge.exe 5264 identity_helper.exe 5264 identity_helper.exe 6092 msedge.exe 6092 msedge.exe 6092 msedge.exe 6092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1312 4444 msedge.exe 89 PID 4444 wrote to memory of 1312 4444 msedge.exe 89 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3248 4444 msedge.exe 90 PID 4444 wrote to memory of 3260 4444 msedge.exe 91 PID 4444 wrote to memory of 3260 4444 msedge.exe 91 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92 PID 4444 wrote to memory of 3172 4444 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb0b5999491ccf3976bf299da9f01cd6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2a3446f8,0x7ffb2a344708,0x7ffb2a3447182⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1953304988655968455,3449921948734641530,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5b91ceb44b7f2550b56f9498acb4cc208
SHA179d3fd70a46880ba6939d79465a002f9eb85e8ee
SHA256419ad95179100b8be187dae6d0d8b2cf50e0d22a54e8e37f96d023b219d4ffb7
SHA5124a06f6da2334dfa02359fa8b742a3192e14692692513a379b07d92b658753f07c08d616f4023864f5aded60e9b36703d3dab1bbd96e9d569d0e546b3357674fe
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD584cc1565a995ffa2a7f5492092d42d25
SHA161f79220ffae831dc560a5c279c2f3e2ff7302ce
SHA2561560965cad7a53af6aa0dbe8cc00273aeb076faa154568a871872b0593e2dd6c
SHA5127bb9dba5f091c0d0370192a0fb1c51670de664aa7c54e81697c882012288e7bf670b62fa01cc3815c02aec5c90f890d863a3914c5c6841055c8f65873c2654bd
-
Filesize
6KB
MD5f58ec36224f408d32577b8988e901094
SHA19cb383a508083b6f11d9ebf317a19366b207be14
SHA256f72add4424880fa81a6b835c709a1b5c8ed8f8185cd10fe364febdab37dcb9a9
SHA51293dbf794ec6e89aa3a19366071240fe655ff5fb26b4f62c18c03a4548f2d21debb0e6e26893543dcc49110a19e688b23e7a4efe614872d8145aae2e36df46689
-
Filesize
6KB
MD55a65e31421abc4e86ba2604c8331f89f
SHA13f6580cb2a2310371ff8981301123a85347f7a3d
SHA256fecba73db3a6a879254575d0a42bc93305cc5759d70d785e67364476e8bc0200
SHA512645bf4c0615adf3ed5c9116e425665a1c245faefa6b93f225b6d7ed599b986010dcaa19a0d34417c2a594ccd877325186e6faf818e54e8554eb22688f626cfe6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5b15e961f45a3d01b4e4e5182a6bf8b46
SHA11c939cbeb91e1e7a21ba37929751245dfbdc40de
SHA256ca8374e988d6d6d64ed97d1ffa98a95f08f763988533bea2d2aa210ecfdd1032
SHA512a3cd8240b92ee6f406f386fb7bcf4262b37d9534c0fd97fd2e9c3bd9a50380ffa6b554bf954a02e87682c449aca47105c19e794fbc549471989d9ed4f7d00084