Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
d6eca1abaf176e19caf99e0e34887b46.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6eca1abaf176e19caf99e0e34887b46.html
Resource
win10v2004-20240226-en
General
-
Target
d6eca1abaf176e19caf99e0e34887b46.html
-
Size
20KB
-
MD5
d6eca1abaf176e19caf99e0e34887b46
-
SHA1
8f32793c46d4182644d20b7bed1b50ec6a44a1a5
-
SHA256
76b7d1173a4be23b91abe6a5d3892175ea63b5f3a3659ec91a6a4e25d78cb2ee
-
SHA512
bf3c3824e0627eb8dde3c04e16537eb8a3e14f55a8babb89a6c1517cc5a6af418279995412e92bc0872cee3b12534ca985d6dcb7bbf6eb3b98aaf323cdfc2c5a
-
SSDEEP
192:toVJktVsod16hYsZJv0OvNZL2xmmFr51SZkQHUg4t+fkQurrnF9lWzwyZssTuAN5:tn9zpT9miVgyWUv1pQZsvANEwBNOi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 348 msedge.exe 348 msedge.exe 3108 identity_helper.exe 3108 identity_helper.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 348 wrote to memory of 1396 348 msedge.exe 88 PID 348 wrote to memory of 1396 348 msedge.exe 88 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 996 348 msedge.exe 89 PID 348 wrote to memory of 4252 348 msedge.exe 90 PID 348 wrote to memory of 4252 348 msedge.exe 90 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91 PID 348 wrote to memory of 3620 348 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6eca1abaf176e19caf99e0e34887b46.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd113746f8,0x7ffd11374708,0x7ffd113747182⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,4946526464062357707,5561747789616660897,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5efa2f2be2a618b08c63b0ee1b9cd5aa3
SHA170af07fff6e079b87d9455c61d433250f40a3aeb
SHA2569471e7503c196e928c74fb7abcec129b38e7ae4ec9c06f6718e7f5d9df15105d
SHA5120538f52f7e377308b1298b59656a306d5798484c53763312691ab0ce4b485fb7eaeec121a59cf5faf9cb4a98d35916662cfe1e32fe6884fb531924dab4db88c8
-
Filesize
1KB
MD5720a7070801af2141b09de7bab96369f
SHA122e123508c07764c7e9f1a925af8a49367bbcd74
SHA2564c4fbdc8595276a17e24f95324bf6e5f6480585af8e8bc98917db789a8e72a0a
SHA51210a1cb8d54d69c00020f1a0db4e2d23c112a276d7491b605d9fc1557b06fd79c6f81a0fad71ba3790ecd38314aeb6d70072127b6c79590385fab815c7d3e99dd
-
Filesize
6KB
MD5a80f17430cf5df46bed043b561d36202
SHA1fbef507a14398ee71b0539530bfb1a8779444706
SHA25664ed655b3ddb07f82c44c681d26b925008efcf55e4363d537050b45c8fa477c4
SHA51243de51215670dbc142d64df6adacae1e32d7efd74fd1902cf2cd84848d759052eea69464ce38132196d09d7406075b2a3daf349715061ea722e599230786d26b
-
Filesize
6KB
MD5f4edb4ddf3b5459c3744bd80037fe91b
SHA14f84d488c9d4748f7cfe320469dde6c8df07816b
SHA25638b6dd8e332a001514c5e0a50b9df5f84af6750e1f3bae4ad9591886a35141b5
SHA51264297b94578a8dc5f59054a52a2bf5e820d13c0c3f8e48fd067b9b314bd5945abf75c2de59a30c3bb6915334a61105e8e59172b582e978fa87628f35db3ad7a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD599fdff07725757477be6d157ec925254
SHA16dac07d4b778516e582192ea4714026decc77f96
SHA2568437c6de542a9811cffedea74b106a3ff44eef1f28a867148acafcb791d522ec
SHA5120799f514a024d214811b78e8da916f20d6da609ef35dd122da119b2196f2f9ed3a664990a818a783d2efd230aba6eb97a33f162a6aba2bcf010c464da6199828