Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
c4e364b36cf7a6e81cfa2ab5f1e2f4ab.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e364b36cf7a6e81cfa2ab5f1e2f4ab.html
Resource
win10v2004-20240226-en
General
-
Target
c4e364b36cf7a6e81cfa2ab5f1e2f4ab.html
-
Size
11KB
-
MD5
c4e364b36cf7a6e81cfa2ab5f1e2f4ab
-
SHA1
db290c55b279d336bb5a6cf557bcaf5676fa5cac
-
SHA256
e04ddfc8c070870d8c4d064ca378c47092314409e4d49c757065bf2181754a61
-
SHA512
619a8004eadbb7089ed507bb5605834b070d5005cc3828d5b35b5588d32ab17ebfce35a92a91dc77f37b954bdd77fdaa390364d4e5348459a262719a2d506fc6
-
SSDEEP
192:2ValIsr0r57MVMx7pT8lM/w1wvqLkt1HR6uBuLbdU8d:salIcIQVMx7SM/gqx6guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 1900 msedge.exe 1900 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4252 1900 msedge.exe 86 PID 1900 wrote to memory of 4252 1900 msedge.exe 86 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 4512 1900 msedge.exe 87 PID 1900 wrote to memory of 3868 1900 msedge.exe 88 PID 1900 wrote to memory of 3868 1900 msedge.exe 88 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89 PID 1900 wrote to memory of 4880 1900 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c4e364b36cf7a6e81cfa2ab5f1e2f4ab.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb10a46f8,0x7fffb10a4708,0x7fffb10a47182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14905869519145786583,8807684866012356140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD58fecf1d30411b0d0899bc56bb95ff5db
SHA12d4e9d04aca0d902f75d9eaeadac3ca1a3d4a45e
SHA2565fd9d0a1492e5c8fbb494d8b301b3f3d82a41a8040c8e7352d7966aea48a765a
SHA512673570510003f2d59fec99d66cf8eb148bb8e217c37e665b41c7b64b3fb26a3c66fb9e8c7687e0230eab31b838fa0fbf6edd0ce22a1c75b0af3a73e6bf9c87be
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD566e5038ce2c4df41e3aee9e49426e5a2
SHA1bddbd0b8ed2428116dee1a0aa3a2488b1c3138c4
SHA2562622b59da00b47c167afa2808a14cb51b4668a53f4c453923a43788e13b962d1
SHA512ba721a8282fee05180fe7c17e1c8c15522c9917e6db339e3310809c10ab05dc6050596f4c92127355824d0beebd998f2b9c19ea0e09acf54002d860d2e878ebc
-
Filesize
6KB
MD5442f881bba7cb70a7e88a116d4fb7c5a
SHA124ae19913829f263ec279d76f686cb5e899818bd
SHA256acefec86f5b03f3d0fbb12c757f64be0453dcfb28c0629ecb4553dbdad334047
SHA512b0aab6cd07ac42f2eefba482be16a35ff7a82f391634155397772ec84cb11531123004f74980c7b5ea69d9d67af531a75c04f0bda1ceb029ce82c4e107daa242
-
Filesize
11KB
MD5f785c068f44b4090277de5510acc2a8e
SHA1a5018b7e4efdf42c373eabac49b1503d317c8345
SHA2565e73d9c2d3506fc113e59153c9b0d43597184a33c120ec08bbe2752c43454134
SHA512da75a3671547dc220137f8d7e069d49b5187591233f47b9d8c4886352456637e64a5f383cfc2d873aedf07cca7c9c0a96a4cfe37f8ccfdcf55626b15e8f94b76