Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
c0fc19a8d78d786aea8b02deb3aa1ab5.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c0fc19a8d78d786aea8b02deb3aa1ab5.html
Resource
win10v2004-20240226-en
General
-
Target
c0fc19a8d78d786aea8b02deb3aa1ab5.html
-
Size
60KB
-
MD5
c0fc19a8d78d786aea8b02deb3aa1ab5
-
SHA1
205eddd57b22a6bb187880000488227545793cb1
-
SHA256
6b1d1cb2e480906821de5481a069f9da8b2607a0bd769c8035bcf6e086969bd9
-
SHA512
52bb5de195b8e9bb9bbb61c2096a29446b33a9b6b76a5018b0451ad30d883a628ef047b73f44edbf4ca6920d0a7a7b7a9f06b4cca1375d470954c294a036c826
-
SSDEEP
768:i2E8A8A0yjjli9Pd6GJ1XY53sHAgUzdXw43wTZR20nkoJNOXOFU95RgwxtMavpep:Kj9jmEIUxAyA9nPODFp83iWIVOBkzI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 2520 msedge.exe 2520 msedge.exe 2484 identity_helper.exe 2484 identity_helper.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4260 2520 msedge.exe 89 PID 2520 wrote to memory of 4260 2520 msedge.exe 89 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 4448 2520 msedge.exe 90 PID 2520 wrote to memory of 5020 2520 msedge.exe 91 PID 2520 wrote to memory of 5020 2520 msedge.exe 91 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92 PID 2520 wrote to memory of 5028 2520 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0fc19a8d78d786aea8b02deb3aa1ab5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3ba746f8,0x7ffd3ba74708,0x7ffd3ba747182⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,8616790291874330911,18315189872254701973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD515200fa5f7a34029c3f266cf0bead680
SHA1b8d7c34b8372c32f46951a154e1f79c1aa416f86
SHA2569d068292b1b43c12eb15d86eb7d985699bdea44d5caa8fb8ae87b64749bace4c
SHA512b7bbb929df9a6fee6c936db991ba8695d37be62dd082a7005bf2f1cb316bf66610301174a5d6bf2c5794c6723a2cc8b4dc43b61062017f94f07bb29ee2c4dcf5
-
Filesize
814B
MD5efebe488b8949b6e3351c3d6db0a3455
SHA126c6afb517349e7f46c93221e83968912658bb7a
SHA25633cc941905f2cf0e05c98266a44ba4678ae951262244110e1463bb15b4de59d2
SHA5124698e68427acc9e35e3ccca25ea1f25b174d78bdbf391535d3034fdd4aaf4bf59371a450e80d1f17fc09df3fec8b9238f759f24142f16282c09755fa34692498
-
Filesize
6KB
MD58450682db6d5e06c50c6968925f1bd49
SHA1c9a1b10a5caa99340107b801ef41f8e436fe28bf
SHA25656ecc1709b98c0d54955cc80afcb68561d133c3320491e40a61f29808f23e098
SHA5121a0f38056e7629902f0f5f8a634a2ed60acdc7122265fce5e5cbfc9ea6c54cdda93ee029834fe3037e7683f800dd7aae1db7489b2f669e39d6a628c0095db152
-
Filesize
6KB
MD503570dc21d0e91f9e3b53b8324fa7c59
SHA184857bb91d9f7f6f66833ca841ad11660b38c8f7
SHA256679bd5d75d41ae60ae98afcad66da6bc74553b0d834959ee893b1ef134f79b61
SHA5121732bdb843b93232c23b7c250276dbc2cc8af00a21ad647274ef09d260489449c88e5873870e02fc15e451a9a92134b0c635bfaab6ace2a993536c5372edc728
-
Filesize
6KB
MD5b2e89b74c0237ea376a6f5c3d67c9b96
SHA1740b9d24beb45340cc18079f921a9a5d5374a916
SHA256c7e7265c9d962c8a6c569017ee8d0bc39e1e523f24df9ca6a732ad40094e1815
SHA51241b3ca640d9b81e7f58470a0a497256180639484c219099bc262df558c2b7970a114eecea48845a137695bc10ff42b1ba85a4985e954ede39d0ab4fa5033cdb6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a6264b9d2ef23ca287fdbde1ea196d7f
SHA189e5f45715c6b3cc9d68d4538915b5f550f004a8
SHA2565d014323b5832aa22fa88a145889db33e55032c0f34b34f46454af4050c57ae9
SHA512842d64a0e87740431a8c89ecae58bd9c7fef58fd8cc74004b56629483455ac10062704895cfc3fc814eae1a9c18d3ec54706a3c11f937fe062ea5d3cde47d723