Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
c6a89e878e605c7ad91009764b442ae2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6a89e878e605c7ad91009764b442ae2.html
Resource
win10v2004-20240226-en
General
-
Target
c6a89e878e605c7ad91009764b442ae2.html
-
Size
10KB
-
MD5
c6a89e878e605c7ad91009764b442ae2
-
SHA1
13b39782b671e8da748afad2d9d08daee0ce5ea4
-
SHA256
bf5375ab02b4b2c031822e2b71c02e46dc14b29c1cd2a566fcc23f207048814e
-
SHA512
9d4cc8a17611baba4aa1850152644bb0341412051cb50ca95eb5695f16b4c649afbe25e04e3ca9347e69ba9cc6471031a42c2119f0151b616623854a25927d16
-
SSDEEP
192:D9VUEz6u4YKZDBZTWNibJIW6raSspgYjgwgSPmK1QRcgOaCcZgLgY:3pKJBZT0i1IW6+6K6IaCP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4112 msedge.exe 4112 msedge.exe 1852 identity_helper.exe 1852 identity_helper.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3108 4112 msedge.exe 90 PID 4112 wrote to memory of 3108 4112 msedge.exe 90 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 2936 4112 msedge.exe 91 PID 4112 wrote to memory of 4560 4112 msedge.exe 92 PID 4112 wrote to memory of 4560 4112 msedge.exe 92 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93 PID 4112 wrote to memory of 3776 4112 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6a89e878e605c7ad91009764b442ae2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e26046f8,0x7ff9e2604708,0x7ff9e26047182⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7105844437055465193,16581875599722411987,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD53b1386816641c1d0259c956f161f9838
SHA1ea2ef9c53d929f399e7e605b2d9a0d16d783c47d
SHA25622a9c41aaa1e075b09ed1df20804cf1d559471777b4c35a1083dae1e0f844f6a
SHA512d4aab9dbb546da4c8894f41e0bef6ed00be42f0f89d279a27846cdbaca1a5202edc7029e3dda4b78f077cd79f487bcdd7214149434492d833fc1375a3958fb6c
-
Filesize
6KB
MD5b6d9b5dbdc537317331a98fea8ff02d5
SHA1ec695d6bfb802046aed0bf0f693abb7b15e97085
SHA2560a397f0799fd4d4cf8cfc8041097c63b63e2a4eecd7bd34eb2e8670e5fe61ce4
SHA51224606b632b3e057b2790d750550a1cfd6bb75f6164537e6dd990e6b819b9ab4c414d44e29ecc7260968bdb890eca8d961f4bdf31ac68fa1426297b7374558594
-
Filesize
6KB
MD56b3bb46dd2a6815dc1108f1ea071cd06
SHA18ac365d7c4e2da3e03047062d5a2b60c686d4c69
SHA2569812707619d92804e668fa492d26cdd5ed1fd6505bb758bd01496b4316981d2b
SHA512969ff477e586703031a90076f934833756f84c127f17a2cab197117cd73d63a5e2e54acf06aa3a8f9366adbcf4aca60a1ed86d52e86ef4f8301c8dd89121daee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD508b075ce01a37ce1beba427d9d6a7d28
SHA1296d946de6511bc817cc6076f53d3f5bc730219c
SHA2567e08fc186c7e97c4161d92ac3ae155c8873f714d5eea56a817f40b2f2506e0c3
SHA512d35a610793e5cbbb20e068e16c4398b2fbae1eb940a40ac9f414f275b74bd65bab30a2f6508ec86835db1c57a32941c012efdd043f0b456f6cc0ddc46e7ba7f3