Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
c0652860900d0b8ed153e66ba344e7d5.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0652860900d0b8ed153e66ba344e7d5.html
Resource
win10v2004-20240226-en
General
-
Target
c0652860900d0b8ed153e66ba344e7d5.html
-
Size
60KB
-
MD5
c0652860900d0b8ed153e66ba344e7d5
-
SHA1
5f88be6d51e27eb9ccb2e6f4822c4790d11a5c1a
-
SHA256
54ce9a665e8d359e425c7a72951c3188d79b828e7a858671c489d5a2bde6fe94
-
SHA512
ec84ddd2c33ad665a08bd617d25b6c2ca3e04532933abc805ba6c00d7a4b83f14ee74d64bfe63dbd72472a7b3b01d433d84896c0072b1fade88dc8b5a194ac38
-
SSDEEP
1536:yP02gJZSjaHyfkve8BA7zK6U74E4cC2tNalNaiVyzBe3AYuc52D2Re:yM2gJx4otC2tNalNaiVyzBe3AYucoDce
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 3528 msedge.exe 3528 msedge.exe 2608 identity_helper.exe 2608 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 932 3528 msedge.exe 88 PID 3528 wrote to memory of 932 3528 msedge.exe 88 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 2532 3528 msedge.exe 89 PID 3528 wrote to memory of 4480 3528 msedge.exe 90 PID 3528 wrote to memory of 4480 3528 msedge.exe 90 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91 PID 3528 wrote to memory of 1608 3528 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0652860900d0b8ed153e66ba344e7d5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff01a446f8,0x7fff01a44708,0x7fff01a447182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1010250773855744114,917840473137658526,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
831B
MD581e41d1110df52c2bedc7544ab3bbc5c
SHA110608190e26c7bcca6bd4249ac91e8aae9dd5dbc
SHA2567df8dcad640408f0ce42b2dd1fe3f5550833571449468b1f0df5d15cb269dde1
SHA5128a641142d0a6d033ed08cb55899957151a43c35211bd7230dcbbabfd3c06e621a14a6d423079437722aeb8ef987c1a664638d1b78ee0e26f4dcd028c5d71f579
-
Filesize
6KB
MD56dec13c3aa058c5af4bd8e388ba546fc
SHA10833dbf73339070e45a205ab5e37ae3b78547653
SHA2569346a61637b1beaa8c33222d0ae40e828d7c5a26a16c7fe020f9c8dfd9c37432
SHA512c5b818068acd5e849ba46105553e925f31cf176aae4b226978755c9a2a65ee3ea8864fba37eee7dba6b7229f326645dea8b83b446749544e88ea63033a8981bd
-
Filesize
6KB
MD51632d88924ff49e040b840632b39e8a4
SHA115277efcac487949ba436263f8a934bca0f6de57
SHA25671a5c08e92f5450acee0e8972b7837f4b989adc72c0068523d8511ae7b1dacc0
SHA512e87d4dbbe082aeda8fea1dce9b3b83950bc0e173e6c4aac79c03b5bd319b02588864e4c4f09bab788291fff25ffc1c476ea2d8e3ca9e6a7dbed99830d13e1a60
-
Filesize
6KB
MD5a821474697b80d8363a5a9e84e879bc1
SHA199a45bd070c4828747607b2ebf1f68e4e6f2422e
SHA2564d696ed3f50555368cb8e8ee7e68fa89a436714ed0854628bb6bc54ec9849916
SHA512131894bdf2be307a7be06f534ae84810030a53bc2845df85c05658794b5a1ed31d825e67b74a91fdd612b484d46086550596516d8fd337f5467ed02fce116a7e
-
Filesize
533B
MD5e257b1e2f13a51a38eadacea26109f27
SHA19040c737752e55b7bf223e4111852d0c92ab1536
SHA256ecd2a638bc206d94d5f3fece07bd8fdae999d3e50eca2ac33b9f46c78ca6704c
SHA5122eabc86bd54968108ec6ccc88806bec089c3c5647d0a6c3bd20e84de1ab344aa55a19ca31c7236bb1025806510173b5d4f3860f69e9f6725893e9f5ae5912994
-
Filesize
203B
MD51aeaa4e6dcfb898a336826ff786a6b04
SHA1ff451c80797a3efb113eb83bcb94c57f31125a27
SHA25678e0a4d77e5ff3a5064a053c910e0a5aae569b8abfb18d32dc427c379664abc8
SHA5121733c40aef31560a923af6d7cf5de36b0e95761649d63a6609f4217fc4b5a42bc1bd9f86bf221a163d7838c3d37ffcaeecdd68abe3a0c977977b04a4412a3fcb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546d07d7d8398913bc0fc84309325f0f6
SHA10c781a1988092de1fe692780fb1370c507bc5fc6
SHA2562baeb944a3f432df4e8665e593b7bdd8d3de16a8468c3f800a295e43bd68f43f
SHA512e263c919ddae5cee2ffd34911e3a7cad7772461737d38d0982673f47542bb519fe867672207e3cc90e1039da79b10ff2b656690731e6e1dade4cee9d2edfe505