Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
c5953b1d85e1f6d2c1519ac037a4177f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5953b1d85e1f6d2c1519ac037a4177f.html
Resource
win10v2004-20240226-en
General
-
Target
c5953b1d85e1f6d2c1519ac037a4177f.html
-
Size
3.5MB
-
MD5
c5953b1d85e1f6d2c1519ac037a4177f
-
SHA1
eb7c4033a79abff650c8626ac232e913bb8a521b
-
SHA256
9ed8be27a8fa2d8490d1495c25257428a4be06f893566f618c35ac7840ff8f08
-
SHA512
6c4a3cb6d1b77ff558f3ca7aa05c003fa3bda700f04be82e9ac7ce9a16bdf4a14122d90a1aa903ea9658b4dece439acc3d725ae582175d90bb6c7feedcba7b3f
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Ny5:jvpjte4tT6s5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 4264 msedge.exe 4264 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 3300 4264 msedge.exe 89 PID 4264 wrote to memory of 3300 4264 msedge.exe 89 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 4848 4264 msedge.exe 90 PID 4264 wrote to memory of 1696 4264 msedge.exe 91 PID 4264 wrote to memory of 1696 4264 msedge.exe 91 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92 PID 4264 wrote to memory of 1996 4264 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c5953b1d85e1f6d2c1519ac037a4177f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd704a46f8,0x7ffd704a4708,0x7ffd704a47182⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9723478941128741251,13279177685236606558,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
981B
MD5de3564d67baaa8161a37816b5743273a
SHA100e7bda1737f613744a75e5a21142956fefcf861
SHA256f60c57a0f8c08b8a0db7c8bd237a6fe06154802fe04905d1a5bef7506f6e2f22
SHA512018f7c8239d5ed56d43cba63b819133f94549cec3e57539dcb3c89c177add68add9b4b101811921c7d56df866f69f66d49529e9bcdfd9f6a63e25ff953cb912c
-
Filesize
6KB
MD58ef931e65079eea5a5bf1d0328a118f5
SHA11f955d292b88f14ecd5a12af40c173390b95d999
SHA256c1e4c5a7e54d5a295845b35a398f2a6ceb904b035ab27efd83dc7be198171d0d
SHA5126bb34d869813150d2271caa1e2cd7348f99c4f9aea80be41694e21502f1ba2d518895212d807a81f91a09507cef41f9d986e417d13d19877d42c39c6e3d4ffd2
-
Filesize
6KB
MD57f79e81bc38e47c5a251f22446395a8a
SHA1a2cc22ac9bda9e4da188eff6e68788527482c77c
SHA25619bbc9ddb80830ef8cdd43ed54d762e62faa4bba1fa3b3b70531f65d47e1bf0e
SHA512bf7f569d3536fe15d494c96228c5d6df20fb8dc45f7edea9a6c63d6cbe6785f2999e1879e0f25350ab9abb7d97604e2ca4558b1cf31d25723b2ad823f5fd8ca5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fdc92e6d7f6ce9e6c700386365a618fc
SHA14288d0f2c71fcd5f8906a3527641d7137e38b64f
SHA2569901dc7747a6129e8505aa1e02190db06d963a9b0d8491b1ea5d0cd188ae04a1
SHA512b1c963f2a6939673b6f9e7529919c5dd1ec342f7fa684f53a62040c83fa98b4c34f4dbd489530b31b4a1861c2b5bddd701cd44c321538c6b163ce5290430903d