Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
ccd961feacd41fe77f4e6dfe58b53657.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccd961feacd41fe77f4e6dfe58b53657.html
Resource
win10v2004-20240226-en
General
-
Target
ccd961feacd41fe77f4e6dfe58b53657.html
-
Size
1KB
-
MD5
ccd961feacd41fe77f4e6dfe58b53657
-
SHA1
5016c633a5b22acc3b4d66b328df7a41ebdd47f5
-
SHA256
245416a615004f44c716cab43f4d9f05aa1bf07e779c1f9a6ddcc18dc3f6cbff
-
SHA512
1d123eccffd2e943a9a87a79b42967549fb317d3ab2849c2d69a39b6a6233be83039f8cfeda76dfbda754d81312826b01b4100a2a62103f55132672b7931bc1e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 3028 msedge.exe 3028 msedge.exe 2492 identity_helper.exe 2492 identity_helper.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 624 3028 msedge.exe 89 PID 3028 wrote to memory of 624 3028 msedge.exe 89 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 4076 3028 msedge.exe 90 PID 3028 wrote to memory of 380 3028 msedge.exe 91 PID 3028 wrote to memory of 380 3028 msedge.exe 91 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92 PID 3028 wrote to memory of 2936 3028 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ccd961feacd41fe77f4e6dfe58b53657.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff513146f8,0x7fff51314708,0x7fff513147182⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,342223898025111495,1260847198042292362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5532 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
6KB
MD59578a47b97f76e12b278d4b2e86b314a
SHA1103ceb21f501f35bfd428fa7f011c9d9287a4e0d
SHA2569ae59f07e59e8e17975407d791133ce7ccd128ffd5e301ca739fd6474c470932
SHA512043fff0d2d05907df8a1caf4f279c169d2632144e3b47b293e61ef93e1cf800658e1ac37ae1c631881780d02d355231ff3fa052d8fe3fa538b53a9fdd5b82518
-
Filesize
6KB
MD5bf86d61d713b59ba22a5e717966d56fb
SHA1e15208d4fba0ccfe401297858dbe528a1ecfb768
SHA256086fa06efe6bed8801ef96870a70255b8007b0de377f038c1e1fde36540202b8
SHA512abf4e6d2d752a5fc0c80f95ea6c64288df87d5c5967c6eb9dfe63a374ff6fd7465ed6e343ea09b9c275e716fc7715e6392230e430b6e946d0fbce2dec29a043e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df0164c966c73f34442b095e10c9c1b4
SHA148e6c80bc964a107465f75da361bc07cd82c0ccd
SHA256802da8541f398f2edd43bef733b063a9cf4f3b5a6fe28af06022bf21904fa302
SHA51254e0fc591ec5f825374c3b71f64fa649196ee88e27a4d436ca41f1649d6b593b87c58e52a98220fa45aaef7e1ca05f322a129155c6145a7d3a58b30d725fc442