Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
c01a521449c3bebb7ed82b32f9cb47d2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c01a521449c3bebb7ed82b32f9cb47d2.html
Resource
win10v2004-20240226-en
General
-
Target
c01a521449c3bebb7ed82b32f9cb47d2.html
-
Size
3.5MB
-
MD5
c01a521449c3bebb7ed82b32f9cb47d2
-
SHA1
c736361374aeb2575eb1a773e4a98b47d2a3dacd
-
SHA256
066a7cda9f6f0ce2615ef75e5e80e645835c019e1aed52b229e7f241d7801958
-
SHA512
e6ef08a7c98066e2b7618c4ec9cb7cf66de662b6421cc76d2f85c8c09a2f4ad15fa7716e6ae99bd43e977b3f6d2da12eb70bc8195cb3f9548862d1b73926d871
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNU:jvpjte4tT6DU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 4140 msedge.exe 4140 msedge.exe 4188 identity_helper.exe 4188 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2672 4140 msedge.exe 88 PID 4140 wrote to memory of 2672 4140 msedge.exe 88 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2108 4140 msedge.exe 89 PID 4140 wrote to memory of 2032 4140 msedge.exe 90 PID 4140 wrote to memory of 2032 4140 msedge.exe 90 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91 PID 4140 wrote to memory of 4744 4140 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c01a521449c3bebb7ed82b32f9cb47d2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc697146f8,0x7ffc69714708,0x7ffc697147182⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13809428445583861630,1759559862074315700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
981B
MD5190300a30c7d286267db4ee048dff435
SHA1d5cadd7a8efd80d1e770229f02d2692c115c2df2
SHA25692d8ab9a3ac9c914c5f1846f4daf16d209beceeebe3d7d8ebe3ede2df1be7047
SHA5128abdf94d3dddc02807dbe934a4ff5e973881022a7b4edde80b004ed6b8076afde6133ca4f7a9a9de77f39ad04ab0565518624310a4c4485dfd3daa74a379b68a
-
Filesize
6KB
MD5284ac646b5f04d2f1cf3fd3acba016a4
SHA1e49b53cba4a286ad91dad81b6475f0af44b130bc
SHA256a862eb94a3ac4907f07e109c52af8c9e044b85cd606d590bae2d95542560383d
SHA5125e776ca1564dffcf722251642d5f41b33cb527bc4564b2745149a4dadab4c36329e8610d2203434b9828b0c7bef19a3c3f2c628eaf236193bf82e33c7a8a6864
-
Filesize
6KB
MD58d4278bf0b59442a284016b14975e335
SHA11c5736d1a3732d0152bf1fd9dcfdcdd2658b6461
SHA256f55169c3ba8e0785b20d4662c41a25222350ea4a6cef3afcc8aa60d6711838e4
SHA512be16fc215f664404ef32947f050c7ec7cd2d2697e1341128efc7717088eb8ca52a0f9cdc36e43c1a44b9a86341a0b33a83424bcb4baa971ab03095fce7b309f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c2d8c5d86073b67187373a8e96cee4f7
SHA1d96d6cf9e99fb72db493b8cb7fcfa92639c991f3
SHA25631b8bce563bb42be018636cfbdb97a6751399b2064a26cad3f81bbd6cc77c795
SHA512a0be5bc02bc3ffd6ad8be72f0a953600b79451d2d0983bea9cadf86136aea49ff2c48b6d7b0d64590fa3b555f6a46fa143d4f08928cc8c1e51999ef92ebf0979