Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1vehicles/v...l.html
windows7-x64
1vehicles/v...l.html
windows10-2004-x64
1vehicles/v...r.html
windows7-x64
1vehicles/v...r.html
windows10-2004-x64
1vehicles/v...l.html
windows7-x64
1vehicles/v...l.html
windows10-2004-x64
1vehicles/v...r.html
windows7-x64
1vehicles/v...r.html
windows10-2004-x64
1vehicles/v...n.html
windows7-x64
1vehicles/v...n.html
windows10-2004-x64
1vehicles/v...een.js
windows7-x64
1vehicles/v...een.js
windows10-2004-x64
1vehicles/v...ion.js
windows7-x64
1vehicles/v...ion.js
windows10-2004-x64
1vehicles/v...n.html
windows7-x64
1vehicles/v...n.html
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
vehicles/valkf/brakeglow/brakeglow_valk_fl.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vehicles/valkf/brakeglow/brakeglow_valk_fl.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
vehicles/valkf/brakeglow/brakeglow_valk_fr.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
vehicles/valkf/brakeglow/brakeglow_valk_fr.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
vehicles/valkf/brakeglow/brakeglow_valk_rl.html
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
vehicles/valkf/brakeglow/brakeglow_valk_rl.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
vehicles/valkf/brakeglow/brakeglow_valk_rr.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
vehicles/valkf/brakeglow/brakeglow_valk_rr.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
vehicles/valkf/gauges_screen/gauges_screen.html
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
vehicles/valkf/gauges_screen/gauges_screen.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
vehicles/valkf/gauges_screen/gauges_screen.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
vehicles/valkf/gauges_screen/gauges_screen.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
vehicles/valkf/lua/controller/nitrousOxideInjection.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
vehicles/valkf/lua/controller/nitrousOxideInjection.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
vehicles/valkf/valkf_navi_screen.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
vehicles/valkf/valkf_navi_screen.html
Resource
win10v2004-20240319-en
General
-
Target
vehicles/valkf/gauges_screen/gauges_screen.html
-
Size
3KB
-
MD5
3fd9d8fd46a0c3a82ed0133d22478bad
-
SHA1
89ee106204d631b06f13b4b4ba37a6ede5099e7b
-
SHA256
784f4ae72bb3e61724e89ce07a95581d2e6843597661e263a9301350971b5d2c
-
SHA512
b0a7082ea59db087deaed7333f66e075f478097db5b691e119c278fd27aaa43b20c7c6844be5520faf8c33dfe99aadb25e22c7c6b74c7937cce8d63854c8e1be
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4508 msedge.exe 4508 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4072 4508 msedge.exe 88 PID 4508 wrote to memory of 4072 4508 msedge.exe 88 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4732 4508 msedge.exe 90 PID 4508 wrote to memory of 4964 4508 msedge.exe 91 PID 4508 wrote to memory of 4964 4508 msedge.exe 91 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92 PID 4508 wrote to memory of 1400 4508 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vehicles\valkf\gauges_screen\gauges_screen.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbc5046f8,0x7ffbbc504708,0x7ffbbc5047182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2328,3618800594423216407,4405382385078985550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
6KB
MD51c90c882423375bfcd72f036b3a6fdfe
SHA1ca8c88694621e3bd941b89372e64c504038228b1
SHA256d6378139661e81fc3d19d472171b6d02da0aa309cf295bdec594f3425c4b5891
SHA5125aaaa7d857bab33cf3cc7d16025a1213412058ea04d4321c37440b63d46c4e78be310bda4af31a396cce6d45cec5779ec1155a8e951e159c836f46a44e41f2c3
-
Filesize
6KB
MD5212812c20e953545edfc9b030e442ac2
SHA13699aaa5f82a73b945c794d0fa82618fc8a54ec8
SHA2565655300a3becee001a0a575580d7d1686249679142bb3ee50e08c27ef6778d14
SHA5120873eb17e7b8e38b8cd7cea38dc91e1057bae08f7272c8f569005a31ee08bc6f3a1bc814104f642a7881fee3b5b0802a72b85f953a6da21bbda63d96a40fc3a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a85ef7a1f68ed227f26d1be27044d18e
SHA168e6b63eade4e1c5e3534090a5faf16df74a1153
SHA256d8e17a13c28a891e491cb134d96966b2ee0adb2a56c2260aa5dcc9a9d7bd600d
SHA5129d45a3f02e94bb71a05ffa813a2fac00685d3547c1b09c11f8c822ebba1e11f38b2dc5f61abc8a2bc73b9fb5b3a3866a4a4c8115c4f5e5e97b44a07437925e55