Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
cd715f46f4e36845edbdef5b3e973644.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd715f46f4e36845edbdef5b3e973644.html
Resource
win10v2004-20240226-en
General
-
Target
cd715f46f4e36845edbdef5b3e973644.html
-
Size
107KB
-
MD5
cd715f46f4e36845edbdef5b3e973644
-
SHA1
d8c7f965f3176ce464af9ef88f1d426953950b78
-
SHA256
f25372f803fb46ccc0d2e02229766b7491171ab00130cf2e5d6b09e5d7ea9d19
-
SHA512
f5b511381504510df57dc5b81480049857299e628e4cbfbc75feb51995e6c9a5b95f1323f060becdb419d087387a5f4524c80a3303015dbdce5f07b9915efbd9
-
SSDEEP
3072:2GQ16tacofkcRkcE3C1BWTOQtzeJlHTUU+sOAaXY:2GQ16tacofkcRkcEM1l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 3228 msedge.exe 3228 msedge.exe 2256 identity_helper.exe 2256 identity_helper.exe 5316 msedge.exe 5316 msedge.exe 5316 msedge.exe 5316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4344 3228 msedge.exe 87 PID 3228 wrote to memory of 4344 3228 msedge.exe 87 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4068 3228 msedge.exe 88 PID 3228 wrote to memory of 4540 3228 msedge.exe 89 PID 3228 wrote to memory of 4540 3228 msedge.exe 89 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90 PID 3228 wrote to memory of 876 3228 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cd715f46f4e36845edbdef5b3e973644.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5a1d46f8,0x7ffd5a1d4708,0x7ffd5a1d47182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2704 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16112185596669380060,4431385348211158916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
1KB
MD582f0d750f00bd7496157c9e86d66a902
SHA1d371ec6eb37daf847289d6a1e414540fb76ce3c3
SHA256ec3322f9481e673bc4f6308039b2ce9d17e3168d4eab5a50734be72bcc300f3e
SHA5122ea8804730638c0aa403c58e93cc8f11b13a2734017254a1d4343b0c8d353af24287886d89a3f7dedf8a8287dfb5866f77f3ef3bf923bdbc26336be8e09814fd
-
Filesize
6KB
MD518550d81c7544b21de7f742c6ae340d9
SHA15fbb9402396320da09de74d6283ab0df0029403f
SHA256cd89e14124b9eca2fd6afff0f590dd5112201cac05528362d0720512fafe43d5
SHA512dbf9a5b008dbb02ab6b7dde0a489134a1f4e6c81800c0944ee41b070287dadfb815183a385d347df958cc5591805580857129a58b6e889f0f9e6fa97452ca546
-
Filesize
6KB
MD51adb76d89509525b4046d3940507d0ff
SHA139f2f4f51546eaec7c334fa2e45cd2b6def11dcd
SHA2562bb658a433f6c06086fa429207e6bdf6ddf9a5ed1f8fe9a3cbd3db71a4c599e7
SHA5128d8eb68423bb161fe45e06120f835ab6af3840cc3fb154fff25f303b27e70c47c8906005966580038dc8906538691991ef8e010b3082e27bcb0e754ca11e4506
-
Filesize
6KB
MD56e2cf184c0fdd5f9df77150f8b103e2f
SHA152924469a0756b6ca9a7d9af3215b2b1f77cf52a
SHA2565c12a5184a9f617a3026e9be45d05fb6f2ab394d85d153e291ead0ff7625a0fb
SHA512df09bc0855b2f34481b1da8c7e0dc6a4bec86fc7d6cdf2ffce91f90249041c76e6e5a9dedd14d89a60582970743e8c90575d8c261815fdab7bb2714aeb5b88a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552e77d4c7a4370337fbd538b0f312443
SHA19101816cee8dd2a4b940a11868a201e7b52b1624
SHA2566f90a0ccdaf3a019ec2193b7de5aff5ae5b334f1b3836ed03f2460bb8662cfee
SHA512497a95f28a51d6c8103e7725c1817e4f3656ef8ac89a554d8a47277d71bc25c54d7e4de2b1006695ae68fab3d152d9a2e7addea078a9a82bfe7ce2bd12ff4bed