Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
e1f3bef17b6921b5e8b91388f1c9ad4c.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e1f3bef17b6921b5e8b91388f1c9ad4c.html
Resource
win10v2004-20240226-en
General
-
Target
e1f3bef17b6921b5e8b91388f1c9ad4c.html
-
Size
3KB
-
MD5
e1f3bef17b6921b5e8b91388f1c9ad4c
-
SHA1
209a02a6d91d115f62935d2eddd75e2171e65aae
-
SHA256
625d366a49ac751ab81e0b73fbd59596fd514a93d3456097d68b264809b0d883
-
SHA512
93ac2389f27d30590eb017c93ceaf40173511c321cbdd112f77a5eedb871624c4cf884d8e15a59a890bf4d58763459232a827ba7f11e8e883f1088209fab5dbe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 2076 msedge.exe 2076 msedge.exe 3228 identity_helper.exe 3228 identity_helper.exe 2192 msedge.exe 2192 msedge.exe 2192 msedge.exe 2192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1776 2076 msedge.exe 88 PID 2076 wrote to memory of 1776 2076 msedge.exe 88 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 220 2076 msedge.exe 89 PID 2076 wrote to memory of 1272 2076 msedge.exe 90 PID 2076 wrote to memory of 1272 2076 msedge.exe 90 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91 PID 2076 wrote to memory of 4540 2076 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e1f3bef17b6921b5e8b91388f1c9ad4c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad6d046f8,0x7ffad6d04708,0x7ffad6d047182⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16255655060162840695,5352657055982302297,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
276B
MD56738f9e69117f8cc4e929636f81b3ab6
SHA102216f8e502f2f9b256c5c118ad85a6f12eb1f2e
SHA256da68db60f46866b28168807374f96513ec82b3315f8d7dfd38d018932a80decc
SHA512b520b005178af5a795f232980235a75bbc8bc505675fd175f875c28486ac2f94ba2817243e586b6f6dedd7d54bf25379bae05673495fa069a1ff8d779845dcb2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5b21d427b9717df6a4e817a0a2e7eb534
SHA12ad9f52229b925f5d9ee3a7248d36ddf5c280256
SHA2560e70f17dc44e00af8520c9bb456bcce17b4de368a96a098769caee073bbb5ca5
SHA5124ffeaad313c6c6c1f1b6decc7c4166452401663cbd9ca856b179bfa54302361e7e113614860c57f1f8ba20e352dfb1765a299c1b670cc4d3be645063c744743b
-
Filesize
6KB
MD5382618c74832088ca39315e6e00adab6
SHA103a515c3e48e4e336603d3cf9bc7a7956b64d4ce
SHA2562d67ddfae78a14597167f0d1e3b69551e773afe6364fdb5da0e12bc944821e9a
SHA5126097262aebf3b30b13294d237bd559cf6fef64ab5e5bc945735be316fc5687e36d8d562c25ac38dba7a066f40afe687e64d23bad053bc8f8f94be496112c4aa3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD537c7fe1252375ea43e05642a730e6df9
SHA1fc9400ad5a3e2370cabef4f7857eae68bd6fec5d
SHA2568216076f4c4cd92daeff5e377b305c769ae0b5db05dda9ccc294d068cc18dd5b
SHA512bc0faafcc7c95dad79043bafed090b274ea10e05a00452bcf48c8884904326da411d0b0f489f8ba39e78fad08289cb9bb4f3babe2ba2aea78d27cbee615afdc9