Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
login.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
login.js
Resource
win10v2004-20240226-en
General
-
Target
login.js
-
Size
24KB
-
MD5
f508087d36ae0654c9f3cb881bf692e0
-
SHA1
87c235c3867f4fdec815580f88a8b7bb5241559a
-
SHA256
6bd94bed0a6bd0f240dce69d96de88afb13a43e1cb3cc46448633d4b96deeb74
-
SHA512
27efdfec2f0f57ca334f0056d0214b03c87241098365ee3c9e8af9a2b3b367b16dad775ea41acb0a188cf23f99d06b3f4871a851d9fab9a6f35e89d51318c621
-
SSDEEP
384:ig9Yrw2z6cI1HKfZuASzc3hj+1d5y6z/UVR6YmF37pHKpXo1C:iQSQ8UzcRUbmMHFpqpD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 2992 msedge.exe 2992 msedge.exe 2488 identity_helper.exe 2488 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 4804 2992 msedge.exe 107 PID 2992 wrote to memory of 4804 2992 msedge.exe 107 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4776 2992 msedge.exe 108 PID 2992 wrote to memory of 4084 2992 msedge.exe 109 PID 2992 wrote to memory of 4084 2992 msedge.exe 109 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110 PID 2992 wrote to memory of 3004 2992 msedge.exe 110
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\login.js1⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8052f46f8,0x7ff8052f4708,0x7ff8052f47182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9952746450879984385,13876651185046496384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD51de2795669cf6b7abb6e85ff96cbb286
SHA114dbfde23b57fcbe2623d63100aff8dd373f0458
SHA256032f842a2d2e52c6b840cb8446531d79cd5fb515c15cb4e4496729c3b43b353e
SHA512391bbb2ac98fa9dec72d7957ef03a0bdb523a2311b80e6f4bc00b4ff65318a588513c4c2f455ccb9739bd41de0dac0220b909871a1d86f630b12ec8fce6457de
-
Filesize
6KB
MD59ab125684cbac306f8b66c4076ff6811
SHA199b6026f4c6b8a3d37d90db95a83dae36455ff2c
SHA2560bba4eff6a4d350248e08d7a1fb74a13998e51800b3e9e78a7f41a8a95c3216c
SHA512bbee4a1c41a8f122861675e96686a21fe8a0b75a3f14cd9edaf7255b10cc97eea41acdbd08832e7e51bead50f6ecd4be8d411e3b485c2b6ed3a23bd14d532cc0
-
Filesize
6KB
MD51b77759ce013bdb671bf0f75101af779
SHA1641a97518dd2caa5e405742c1420e07d604bf295
SHA2561c8ea0ed9d1f0d671206b30f54b8ac2784a1690072482b88257a399a40ed4373
SHA512f79ba88ffa83fa9438f1b91251a77747980720e98e48c8d0b383525cc06f0d1d4c963e1e5d603aad653f817984acb77a0cd9f7123eb72ee6ad3214420e8889c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e25d7c6b582d2ae1cd8a7884aae96eab
SHA1f25f73e195b2ef3ed2cb0ac7f4121f8e23d5b6ea
SHA25663e8b422960cead40151e7e607b4e707dcc2929918128719dbba22716ab33bf3
SHA512f2f3a0087cf91dab2ef17ef7c19be081f5ccb2cb9024ff6c5a79d484079bfe4d973b716ec95c527bad883ab347318a6a6b00c0bc2162ab401d0ff1032bfc571a