Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
c1b224d2c48023755dc8932202342e4b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1b224d2c48023755dc8932202342e4b.html
Resource
win10v2004-20240226-en
General
-
Target
c1b224d2c48023755dc8932202342e4b.html
-
Size
19KB
-
MD5
c1b224d2c48023755dc8932202342e4b
-
SHA1
aafa1e1d8542dbe7c2e97b1c9e9903f7b00fe1d4
-
SHA256
e12ad379bf750de1ceef9facefcc8de9cbf446d44d90186d8ada0a75ca1ff9f1
-
SHA512
6259e0bb5bbc0d0a2e09f3a5449192e0b5bdeb6767676e864db738b4cb890b902add2cae59b5aef2e25cde99dc9b4fa7ad17439241b39724ecbfa2cbfbae75ff
-
SSDEEP
384:4+QfPFd9QZBC7mOdMQUtKfpC5IgSnbmFe7AcFE6kVLDPd:Zcd9QZBC7mOdMQFpC5I9nC42Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 3092 msedge.exe 3092 msedge.exe 2256 identity_helper.exe 2256 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 2196 3092 msedge.exe 87 PID 3092 wrote to memory of 2196 3092 msedge.exe 87 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 2988 3092 msedge.exe 92 PID 3092 wrote to memory of 4548 3092 msedge.exe 93 PID 3092 wrote to memory of 4548 3092 msedge.exe 93 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94 PID 3092 wrote to memory of 1692 3092 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c1b224d2c48023755dc8932202342e4b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3b7646f8,0x7ffa3b764708,0x7ffa3b7647182⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9951603688519555815,4665872697308375561,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD59b0eb2e300f1b91b7e5d8e8bb691f962
SHA184f0f5c5e7c43ff0832286d72633b2dbeb14f8d3
SHA256c4d9f0548fe6b7193dc18453cef3ed181fd5e12c341cca534616f4b92f4f69a4
SHA512df5bf5c52779e7ea7c77b834fac40bcd374a9da95b4c174a6286e61c5d0265298240f5ce05c086b71736e3f52db03a7da5b5ee0dedd488edae4747259f1ecf91
-
Filesize
1KB
MD56112ef945f7a3a807b224d866891ea6a
SHA1a6de5e3204f6127c96dec8d1dd8a9b119ec95277
SHA256301deb4a38a6c11e8bf850d48ad76604d1d08501d2c8826bf63aa3a49947617c
SHA512ae6bd77b008faae7860df3a56e162ccc5d1ffa91b0bb9a2f914d4182f263c88306ed91f6d3114e87338bf03dcb7db81ae2c47946b8aa800acd55a49c721eceaf
-
Filesize
6KB
MD57dbbd61ee65580d0330615c429f0b6c0
SHA17bf9fed387498da64bd568a2b6940f0dcad33377
SHA2564772d6f499c9fe2197dc53db2fa84946af57e104b01c0b05c30228151f7fcdcf
SHA5124ef182ea08320bfd69fd36cd6cbce1025aed300a770a4a4483fddc82294b4d6a1d5e59f9986bc1540ace3354cb703352fed8caa2ea3539338d07fed9dafd246a
-
Filesize
6KB
MD500bd983804784e340db2f6cfc2c38b4b
SHA1ade88a689364f75fbce554de47aa9e0408c56d02
SHA256d29bd5476b14be7c438f347f463c1c936c52d22f4cbc3a0de67370304e3c825e
SHA512b9b4281bd3ae98eb943fb3d23a61cf82ce66271ce5fa21f700d620f3bcb615e3f3dcd666e5ef5362094ebeb4444128109fe079958e1ad90095c488ad37d04c43
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5407c408668ccb1714abee8d2c1a284fd
SHA194b52abcbca6c2ff7c7bd5621e975aa3839d0d45
SHA25627768f566d6b05b7a549ff7061df55fcd1934a73a3a32eb9dcfd52a4ee09a541
SHA512ed5ba274a506704607dcc2dcffdb90645e81965b1a5fde3739477299765e2f3a4def68435ea4646a48976cd1aac491ca259db50ce82f30cfda537f09c1f77e5f