Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
Q1nr7V.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
Q1nr7V.html
Resource
win10v2004-20240226-en
General
-
Target
Q1nr7V.html
-
Size
1KB
-
MD5
0961eb13ef799b1c1f2a335965f343bd
-
SHA1
5d7ce0e0c0137d85da4d7ced88bff2bdba80ed20
-
SHA256
8ef0aa04db9fe87fe3e9d92103882dde1531a55f8c7fcbceda55f8ae4f501435
-
SHA512
554458650ceec6f091e6451ed3eb46141d98deba5cab9fc54c0b956b90939caf5d846edc6ae4d368d88a964c2259f5cf9fcadc8f7e610b30928ea65af9b5c777
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 1148 msedge.exe 1148 msedge.exe 2600 identity_helper.exe 2600 identity_helper.exe 6072 msedge.exe 6072 msedge.exe 6072 msedge.exe 6072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1892 4160 msedge.exe 88 PID 4160 wrote to memory of 1892 4160 msedge.exe 88 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 2064 4160 msedge.exe 89 PID 4160 wrote to memory of 1148 4160 msedge.exe 90 PID 4160 wrote to memory of 1148 4160 msedge.exe 90 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91 PID 4160 wrote to memory of 3896 4160 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Q1nr7V.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb90ca46f8,0x7ffb90ca4708,0x7ffb90ca47182⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6570776217129466168,8183590266183326404,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
6KB
MD507ae42845da1998fa7a45fa8447dbb25
SHA1b5af47709767c8406c81ee076a2b962315e7bc9a
SHA2569723422568f5aa44b264e66506cfab4264836e91249bb5a2e250a97487ad5f55
SHA512cdc4f0e568b03689acef7bf0ca4cdb4cd5c007a30c35bad35d4f6faad6a72141af250142db2e173a7fa8dfc7aa2c52be8832798a8b9f066aeac76da2963eefac
-
Filesize
6KB
MD57fb506fb22c31c39cba2ca66a2b2da1e
SHA134a46fc15f2fc28942e0bfc9b66621cf755c433e
SHA256b701288b13b2ce10b8f14b8d9f142f069c1a5e7372d046f3be21189807d3572f
SHA512cb88e3c30d04e531b70e8bad81f73649b1d7365efc72a1cdb419aedfd0511ecb93569372a687235eb564c6c321f17bce42abb9a5ec2b2f02819253404b446cec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD559f7337f7bff11f821c704c1c05ba6f4
SHA169cb2bea2d894004271aaa6e207f45d19a2ca49b
SHA256799b50bb1146c2393f41b7b18f2ef4e8941b22193949aa7dd4ac2e7d5c5e9d26
SHA51292abb4bf4d907b8a57d8209bd024cdae2faeead491ff7a4a20e29b89dad2d935647fd5b45192a2ad7e62129ce5ed791abd3746c3015392297c6c06a7c3306705