Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
d4c4a924fa6dbd18694fad37cf05f811.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4c4a924fa6dbd18694fad37cf05f811.html
Resource
win10v2004-20240226-en
General
-
Target
d4c4a924fa6dbd18694fad37cf05f811.html
-
Size
6KB
-
MD5
d4c4a924fa6dbd18694fad37cf05f811
-
SHA1
acded29a37a4a4e19d249d2d7674d9b144e840d7
-
SHA256
dbfa4890b869504d7f0b4ce7bb71fe62cdb435f65177bd694f9a406621de3ee4
-
SHA512
c4b539336374ef4ccf81c08a55a35272d57358e7dafe1fe5ab131e7162aaffe3dd9a7198f51a77a0a7b28ef9b488073dfb55a10225c39f55461b9b85ff7fc33e
-
SSDEEP
96:uzVs+ux7vLLLY1k9o84d12ef7CSTUIbca1sLiVcYR16cEZ7ru7f:csz7vLAYS/R3R4b76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 4980 msedge.exe 4980 msedge.exe 828 identity_helper.exe 828 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2620 4980 msedge.exe 88 PID 4980 wrote to memory of 2620 4980 msedge.exe 88 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 1148 4980 msedge.exe 89 PID 4980 wrote to memory of 2712 4980 msedge.exe 90 PID 4980 wrote to memory of 2712 4980 msedge.exe 90 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91 PID 4980 wrote to memory of 2268 4980 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4c4a924fa6dbd18694fad37cf05f811.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe87b846f8,0x7ffe87b84708,0x7ffe87b847182⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16969172459190554905,7427079825620719344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
6KB
MD5bb5f353bfd53d8805a8fa36d78e2aa7b
SHA1a142f85f5cfb1e8e3450d061f2d0745209e62b15
SHA256bc33bea5882db55a610a14175e00a7226d06de5077f075eb930b0725a42471b0
SHA512d35b293ea171fc5435d338437cd3af288ec8b6e88be1001b1de10a580491963ef43de89536c7192cf7192b89ef3ad89827f4eb52a8fc7415cda73310fc9771ec
-
Filesize
6KB
MD51dcb6196d85deda080220c44e1abfcb5
SHA1321186f9b28ccb81713e3b266c953217d00acf3f
SHA2560b4414b77381c47820e0bab8fc8b626ca6723119ad62042b94ce892798041a72
SHA512021ef2d3a969dbd02039c75ddb6eb7dff119c224ef47f90673c093800f6ab1a2d96ebb81ccb07c053148bdfdf3fa96db2739e35dbc500dff721b584ae7a2c299
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560e35b5086c8b4949073793807743e26
SHA18ce6e331c431fdc38143e6adf029685520dcdd12
SHA256c31a6510ad70e3ee156e6cbef1ec417fb8c47e685ef532f50f93581180411864
SHA5120c3054a83236575b069c6c5bd7b32a55490b9d6f178d3027fba2503836f4d615e0562557389f7fe86b20594297db100e6edeeb9dfe76e290bdbfbe9cc2c7b682