Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
bb3b526d85af2007437d20412884bf41.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb3b526d85af2007437d20412884bf41.html
Resource
win10v2004-20240226-en
General
-
Target
bb3b526d85af2007437d20412884bf41.html
-
Size
55KB
-
MD5
bb3b526d85af2007437d20412884bf41
-
SHA1
414b0ad55d453387534630f57e0bbc5034bbbc46
-
SHA256
69c76765a99498d69c28558718f3f1b7907470fe8a50b2370d499300fcaf29d4
-
SHA512
d3921da418aecc4f1d4e27f9ec8ed5297d8e60d4fc3ef6cf77105d271560d711bfdc954305fa6c4914ad41b5a2f3de709bf064863fe73cf078606d8832754589
-
SSDEEP
768:2r1D7jDpHvvCIooNlI05EVyP1KtuXT7vXrAK0RRVdlBVIl:2bHv7oilIGXT/VuRVdlg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4460 msedge.exe 4460 msedge.exe 2076 identity_helper.exe 2076 identity_helper.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1560 4460 msedge.exe 88 PID 4460 wrote to memory of 1560 4460 msedge.exe 88 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4032 4460 msedge.exe 89 PID 4460 wrote to memory of 4676 4460 msedge.exe 90 PID 4460 wrote to memory of 4676 4460 msedge.exe 90 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91 PID 4460 wrote to memory of 4820 4460 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb3b526d85af2007437d20412884bf41.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaee9146f8,0x7ffaee914708,0x7ffaee9147182⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5794140465302253037,7132757752424037845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53dcfa71d512fb3708b38d477e090d9c5
SHA1f4d8e10512f65987d5889a94d118b06c0fe7c1ea
SHA256f1fed9d7ab2af61cb76fcc469df0820ad83a9b1aa5e9cde5464002c8a5c413f7
SHA512278d28f2c9b95c979f2c60d865d223479f9416cff3474685aa27f4db5219533493ce366499fb993418d00a115c6bfede35316ab82701cce8ad3c621ff4c2500e
-
Filesize
1KB
MD5f8dde18365d0d1b0472e7e61f29f1939
SHA1361ba899f7664523645848de84e66b187adcf9cc
SHA256e4a7da7e7a35520937807cbdc8498f731156d538831207ae3ff76dd9ff4429df
SHA512836c2ae4104b942678f8941c8c262249868f4650d45eaf3859872758951293dcc8cd428437e681ec5c2bf4dd9f44f7275704c8091cb5095c803d239a6323c569
-
Filesize
6KB
MD533c0b7f23879ebc8f383ff17b3a43812
SHA1a7ea9c603ab39c242b918cff6fd7a343cb6eb036
SHA25645a68f99df1da5e43087228d3097095c917af6b07c6a66302ee18d363d26dfc6
SHA5120e49adcac08d2a11448648593181d8cb6b81b092b8859864622edb4ecd6ea502188da127e7320039cf204a7fe895e0b073e570b7bc062ed37bb288e0d90065f8
-
Filesize
6KB
MD5cf8639115e29d167c896e9b27f92730a
SHA1c3538c8a13727622a69812e8325c55ec19228b6c
SHA25663b659f623efcbe07dac7a9f0107b2a56a2f67d5a2d000863abfabbab66b05d8
SHA512b5d9e96d0c011abaf1e94ea915cc726d9a183ba4713848db496177478a1301452f384c078df9200e42c7a0d9cbc404a13afea1eac9d141ffe1689dd7a6d399ea
-
Filesize
6KB
MD5b2614f4ee122adaa616e0d450773120f
SHA18a3621f94f112a1ecdb5061949892fcaeb6f466f
SHA25620ef808a2cba4af2c19e11e21b9cdc31cbdd380dbe5bb1fffa3b9bbe2073837d
SHA512d05a4730322588adea52a83282142b325a3f9586e822ae2115534fd2a3ca0772767fa313980e37447adb45e1628d9fdb4b192076bf50496a574062cf9b118906
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e80c9eddc0c969bcb931578bc5edd4c
SHA1b16f60f1f913927f8b4f23f712c5900fcce70c38
SHA2563abb8ac224cc104a53f30828181a62cb354b14c9ee59dfd475e2c92f3b0ac8b5
SHA512b256e42286ecc273863306fb93daca5ca540147f5ad4bc6aff8329f93bf3c6c079b9a62b09529bf529872d672954627fb809266879b1512d0b00fa78e4e86ea2