Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
debeeba787bbf6dce99054d14d802dd7.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
debeeba787bbf6dce99054d14d802dd7.html
Resource
win10v2004-20240226-en
General
-
Target
debeeba787bbf6dce99054d14d802dd7.html
-
Size
57KB
-
MD5
debeeba787bbf6dce99054d14d802dd7
-
SHA1
6948825c8c6b627bc30feafc3113e202c333ead9
-
SHA256
297996b7f8fbb591316a41d4126c02604d3cadf8ee1227d39352a714d3ccb3ae
-
SHA512
01bff00f09da5b888454d6ecb374e01a98e2342d888fe0feac6518bc574f972d74c09176dbcd3aa2dbfd77b70e5a3c14dc97e1f5d7158d4be91b256d9ee3d507
-
SSDEEP
1536:nIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZZWc:mZW9PYFVYU8W1aAZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 4208 msedge.exe 4208 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4208 wrote to memory of 2336 4208 msedge.exe 86 PID 4208 wrote to memory of 2336 4208 msedge.exe 86 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 4832 4208 msedge.exe 87 PID 4208 wrote to memory of 2924 4208 msedge.exe 88 PID 4208 wrote to memory of 2924 4208 msedge.exe 88 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89 PID 4208 wrote to memory of 3864 4208 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\debeeba787bbf6dce99054d14d802dd7.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe773146f8,0x7ffe77314708,0x7ffe773147182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10592803541832963635,400465315293894754,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
308B
MD5b112d5bf7f0106568da902ba836b1eb1
SHA12bbf536abbed80a34906a353050e5eae4bed6fcf
SHA256aa8e1d230ee128614c05e29128cea6c8ca5b54fbbb337126efe50721d5d129ee
SHA512b9e72c9add33b0378acc9a5fef068926c4507280c43c4772da228fb1076fa0aab4d5024587beaee6afa2fd2bac827c50df3a4561bfd745bda6e041b52cfc360d
-
Filesize
6KB
MD5de7cf720d13d3f33eac827bc6d78f13a
SHA124256878e1004ad47911261522b9b4fd891e218f
SHA256dfd00ed9f15ed29f4f19937822c332c2fbdd93b7a53ddc016d4aafa2c6b8fe5d
SHA512bdb137e68f138a160e93b3b88ae81ef319393e65af718eac1ab4c6d558c57675e143f6c2efa757457eff4bc1edf0043a85fd588d2aff80702e06c6cf645cb6a3
-
Filesize
6KB
MD5d433419b40bc0757c9e5492e228bd873
SHA119f20bc160e25cc14492d2c2dbd15551fd0d75bf
SHA2568126938d89cb072cf741513eb331977719f657f33c2e534a2d6cab9173d517dc
SHA51220460e469189ec082026fb7461cb3006e7a61da47de27f92281fe9d16314c021bbdcc18213663f644030cae0e22ea387c10a6d95d468dbf9dffc5ad333ff62be
-
Filesize
6KB
MD54b43dbf772ed7edc57921723781ef469
SHA1affcc5e733f1372a1044cec47b30c49ffe3ee7ce
SHA256cf607ea52bf9df8169ca13ed5e73d50f1a137980259a0d9b7c3ca7b5e5a29294
SHA51289aa20351a57d97128969b1bd8fde937cf814de54b5351c2b9f1e489f11ac7d264ecf6b04516bca8a5209dc05cd5ca68d5d859506ecf20124eb4806b07594ffa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD596b352ece2db4329e11f74f8e07b8b9b
SHA11f78d3ad27cfd043397e9c2e558d049b8376018a
SHA2561ce5cf199d7de7da2046a762004dbef954af06c8a00523898ba4a7410a723810
SHA512898209622dc14382b5d2054cf8aa500179d416632e16a3a050d6451ea1024556120dcdbcdf6c207d971600294811083a216f67ab1286fc7e94c69a17c10cdeb9