Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
cd40f827ded5f502d60bff543a81e711.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd40f827ded5f502d60bff543a81e711.html
Resource
win10v2004-20240226-en
General
-
Target
cd40f827ded5f502d60bff543a81e711.html
-
Size
230KB
-
MD5
cd40f827ded5f502d60bff543a81e711
-
SHA1
281c44b9f16ec946761209cb9d41e441899f5c64
-
SHA256
eb875a47c1ff57b087c09cff91ae3e94aa5852558bf51e0cfbc55f3c63e933fd
-
SHA512
ac94835b47ef319118aa383c2b46bdb9bc8e8c703b4d83cf07a4c65b93001d57d23b3804d6da3af83d9db74b77e84a56f1ca15ca7c5b0df382bf40eb9d59e5c2
-
SSDEEP
3072:VrUEvNz//geesR+g+ntQoDmhWmhE+mhVNuZhrQyw8:pUEvNjhVh0hu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 2864 msedge.exe 2864 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4508 2864 msedge.exe 86 PID 2864 wrote to memory of 4508 2864 msedge.exe 86 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 1288 2864 msedge.exe 91 PID 2864 wrote to memory of 4704 2864 msedge.exe 92 PID 2864 wrote to memory of 4704 2864 msedge.exe 92 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93 PID 2864 wrote to memory of 3700 2864 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cd40f827ded5f502d60bff543a81e711.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c99e46f8,0x7ff9c99e4708,0x7ff9c99e47182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11157491083898649377,10371742836381155311,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57b7a201f598c2fc89bc63ae1c4e7698a
SHA1dec672222df5a0ab64ba5110b4e6cbc8d3e4dc2e
SHA25634afd08e9ace525ba44d722907404f5a8d1992d3d6b2574a8b678e8cda11bab8
SHA512624cd4914e4db9fd599272e4f79631894ecb802d04437628517c63f47b269f99c0c883678a1629e7ffc6b565b5994bca1edabbb0e4a989d8f66163d9e2ee2904
-
Filesize
1KB
MD5e54381e8248e0532e5cc48bb20a91260
SHA110eede83f922f7865dc35730ed34877197477606
SHA256f234f84935e85b4d734ed823acb432610a6cb1a6187ccedd0eb4aac67cf1b347
SHA5121c0f719b29d3bdbc3b5415835ca5629b2008fd5bb6ebac81a17491a528d7a6f69e88910b20a736fd263e5e57070b3612a9197d3b72786d4dcd6cb0d417975872
-
Filesize
6KB
MD5c51628912cb3a087fc19c69100ee3079
SHA1cd297c5d54943a4764ac058ac75a8f682374dceb
SHA25649bc780107a8dd846d97d5fb6bab565aa3bf021c100bebe0b9dfb31678e86783
SHA5128f80ebed8e88b89b4d7f8ea371f5694e9882762e5d957a098f3cedbfa27257f8457fbdcf2b46f8e469527876c288f07b3e134fc942afc5e038500bca0e9e6446
-
Filesize
6KB
MD5500261db5ffb77efc6bdff53f2f50df2
SHA127b9953fd442e7d8cbd261eb16a3be437c63e175
SHA25657c3227a1d98e5ca9df92b543f7456a615e6ed1f45c53a887827a170f4d8ea1b
SHA51216bd7c7567d13efca47e51a022fe684fb0c3b7368132c136779834b6c32c559005ed5a2e97660bc9d06875c0f905dd01b68acbf5accb8f713aada34db4745de9
-
Filesize
11KB
MD569f2b737b85193c90f83e516ecae9ac1
SHA1c99c77f21c59c8c782461eb5b1f2b88d55a61d5f
SHA25639d031dce69038694831c69b5ac53de5a7033fd29b97957118976a0cdb2892eb
SHA51245d673a1264ca0706b10831ae4cafb8b4eef8dfceb7a458747835210f5419fdd159366d7697daca3c1a975fb061dd23ebc441f61e4870766e9349246caa6981e