Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
de5161dc56d6374054bb86eac56b84a2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de5161dc56d6374054bb86eac56b84a2.html
Resource
win10v2004-20240226-en
General
-
Target
de5161dc56d6374054bb86eac56b84a2.html
-
Size
23KB
-
MD5
de5161dc56d6374054bb86eac56b84a2
-
SHA1
75150767460fc3b7afffdb719f29adbefaaf48b1
-
SHA256
c4ad45e8317fcd67a9cb56a7dcd717f5b8ec2f66c859d66319e473bb9f140386
-
SHA512
f12800ee48c0b1a1b7913c500d42072f112dd7ab4b33df2fdaad0ccac72e6acc5b70fd42e49ffa906a869c3bb9cea120636515f92c89e48ad6534dcf8437c24d
-
SSDEEP
192:NoHoRawb5nrnQjLntQ/knQieynInQOkrntiVnQTbnYnQVanQt7MSnFnQ7XnMnQTw:mHosTQ/B9O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 560 msedge.exe 560 msedge.exe 2412 msedge.exe 2412 msedge.exe 3332 identity_helper.exe 3332 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1384 2412 msedge.exe 88 PID 2412 wrote to memory of 1384 2412 msedge.exe 88 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 212 2412 msedge.exe 89 PID 2412 wrote to memory of 560 2412 msedge.exe 90 PID 2412 wrote to memory of 560 2412 msedge.exe 90 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91 PID 2412 wrote to memory of 3100 2412 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de5161dc56d6374054bb86eac56b84a2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8ef346f8,0x7ffd8ef34708,0x7ffd8ef347182⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3333358351946981256,7621865934911255297,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
6KB
MD5584b99d8027329d7cbc72f4df973e968
SHA151ba0b89a0906effed64b75c48daa0561f43aae6
SHA2564b4e6df9a2782371ff7b48e5a73b48fde16a90021335bd5d727528eb03621f52
SHA5123e4599f97ac3a147a99954fd242f2210bc5e9baca4473529ca777704a65cb242c20ee1b70a8d00a025281d2435d1db7d813ab17b76b5b5024a0fae00c9e8bc82
-
Filesize
6KB
MD51da58bd96806c8e7e48f876f12290c3c
SHA1ecd90f066ff25ca2246c25642734ced0195fd183
SHA25676f8a0bf4145398d7c0f56ae8f384221ebd7c48f3b396ee67dc8513eee9f98c6
SHA51271b233135742d00c98687fde50a72badbd497665472fdf7121051ba031468ee89b775ea4facf7df79d539cb865fd78e93bd77c822c7a4ee2bbf4540f1a11768a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58f1708fad1e37e9cd4c86a3ec430192d
SHA15a5ca7e91d852c176cb2c72d23378ef5f8f65884
SHA256e43f1f899607ad1956acce54b240975adbdbeaba6b40a1df3291402e73ba9e62
SHA512bfa902f21b616320fd131a1a0ae12b9cf9bf7e39a96d719381960bf6d37f1d25c8629e4be4743c0318061d568baea265dd90a2b079c3f4fd9e85aebb34cfcb9c