Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
c0b5bd63d89fe1cb4b7013615708ef16.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c0b5bd63d89fe1cb4b7013615708ef16.html
Resource
win10v2004-20240226-en
General
-
Target
c0b5bd63d89fe1cb4b7013615708ef16.html
-
Size
16KB
-
MD5
c0b5bd63d89fe1cb4b7013615708ef16
-
SHA1
2ea0b8ffdef1034da8129e6a5de9c34bec79aeea
-
SHA256
c1b3e64a3c18248fe0827aa95dfb099b1ceb2dda205ea91aba42d4ffabf3a212
-
SHA512
0430540f4bfcd9b71c9fb8a0964734fa6323c5f22ef2a0869d9ffcd0d256f2a9018abf302c2a4fa41626c57f021f0c25da91b90fd4b03075ecfd1a58bae64acf
-
SSDEEP
384:F8rAFIGNdzSJhJ+2nTJT2o5QX0yOsS//3OMvOr:sQrzSPXV35QkPRyr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 452 msedge.exe 452 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4256 identity_helper.exe 4256 identity_helper.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1500 4780 msedge.exe 87 PID 4780 wrote to memory of 1500 4780 msedge.exe 87 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 4532 4780 msedge.exe 88 PID 4780 wrote to memory of 452 4780 msedge.exe 89 PID 4780 wrote to memory of 452 4780 msedge.exe 89 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90 PID 4780 wrote to memory of 2800 4780 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0b5bd63d89fe1cb4b7013615708ef16.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad33f46f8,0x7ffad33f4708,0x7ffad33f47182⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,4674169127114329138,17898350618349782462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
6KB
MD537c9a96418c150c5ad8e1e55c78435aa
SHA199913f7943a45625becc10d81b3f0dec58677a35
SHA256bfdaf072ae9c1508a7f08a0a67d28a702c35101c47332dd08e64244354b98cfd
SHA512319aec1f0bcf9a6d103975b456df07bb1ac0213fcb258567388d7d4eb33f6bcf03c6073c06034b7593b2372f5c6b0fcc730d6cf7f5932324b4114533abdd6038
-
Filesize
6KB
MD524955c87f96a5f90bf738698ca5d9484
SHA19ad4dc092ef500aaf5ddda3266a9e86971ba5fc4
SHA25682b7b677719b385337530bfb5ad75294b84d1a806a3b015847edb21bcea3c63a
SHA51294c0eda03c0131aeb4ec25b8390136a6f88d79cb2558f1e244970584045e9ff56dc2b79fdea0b4daa5987c8f6ac43b959f6ab08c987bd1249cad51bf1cabc788
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5722de60532abd1dc6b17084edaae7ce3
SHA1d022605fca147546c818890d5a4aceb55a66df66
SHA2567fa8a34ae069da27617548a59dd7c4889477a9d210cb18ccb1c886c1e5d2039b
SHA512ee58556adc857bdbe82e1fb48939a4e166e831d2bd6e22a4b9df67f1d74be56827b952329af4875e5ce9587dbae7f1256e738247dee5db451e5f64cb9847e0af