Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
file_example_MP4_480_1_5MG.html
Resource
win11-20240412-en
General
-
Target
file_example_MP4_480_1_5MG.html
-
Size
199B
-
MD5
bb8f534fbff5ee61a95af9c4740ae043
-
SHA1
832e403d42aac1fec93e4f602338544d3fd2e4f1
-
SHA256
5b13fb5957b84ef7bb9d0b6cd509c947ff6a37d67efdac2b896ddd3b908aad10
-
SHA512
eb423ca8e0f3e026a367130044b1857a1368097f9ac3c8fcaa523fa5e2785437fbc328397b5c6582fb0c872cff44e70cf0120d874d825472806adc46acdbffdd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 1420 msedge.exe 1420 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1520 1420 msedge.exe 81 PID 1420 wrote to memory of 1520 1420 msedge.exe 81 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 3180 1420 msedge.exe 82 PID 1420 wrote to memory of 4020 1420 msedge.exe 83 PID 1420 wrote to memory of 4020 1420 msedge.exe 83 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84 PID 1420 wrote to memory of 1572 1420 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file_example_MP4_480_1_5MG.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc32bb3cb8,0x7ffc32bb3cc8,0x7ffc32bb3cd82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1736 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2460 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1900 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15184392313748016124,1872583517128995826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file_example_MP4_480_1_5MG.html1⤵PID:584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc32bb3cb8,0x7ffc32bb3cc8,0x7ffc32bb3cd82⤵PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db6f3e04e8d0e847b83d778e43552540
SHA16f58849131e27b05ba16d1e001fcab3db510af9a
SHA25674058d1dab7f6c19b598835bdc3050a9b8afa46b17095cc5bed4687ac2384948
SHA512b12bc4a12511611d35e426d17a0bc3e99f3045ad7246deacb4fd50aa74f5e2da3f336c972b52a8a48821f1fdc3f85ed12666f54ed1e11a61e23926285014bc1a
-
Filesize
152B
MD5dc3fe6b634c77522eec8ca4b8d4434ea
SHA1f8da22ca5d5f4788078f5ed52f7f12baef619b4b
SHA2560fe3ee7f209b5350c0876b6dc7c571c2af5db80964e37835b6e7279cd311d31a
SHA512c5cc2251985ae5aec6082a8a4e4dea1f1a8bf72c4ccf199ad4a3e17509a4f7152ae60b1bf84d77e843e4d7043bd2f0da63d620cbdb8ededa94fa4606d016ec69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0ef3bbba-12cf-4f95-bff9-b100034ec818.tmp
Filesize5KB
MD50c4df180b21f31087f1fcdb246de2b31
SHA1506c7be08160aaf25deaa0822904c2b95966b3bf
SHA2565959be27b98cb93c502fbcb3739bfd0e570255aa009e349bbc664614f46f1fe3
SHA5125daa9a892d1e10a8959804f7943b5806f2bf99640339e239cd3837c23d5566749c912e05a41591039fb86d4c03843f174ec8ba6cf1e2712fcdb64854dfb181e4
-
Filesize
5KB
MD59bd9a5dcce541aa39bd0e77d2cd9091b
SHA107c99b1810f4b525a22808dc9202222fe9752588
SHA2563a1c51609a27a29c7cc2824b304362ff55960150564f0670c09c76df5d71960e
SHA5124454734b16053cad8f2ac285e29abd9c62de9cb5f77cc9fa77421d79ea5cc95301acc352dc9094636d0bfa27036f287346801e1a901d839a6e3200c4554fe5b3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56e4ba9a71f3340ba438e5d652f647948
SHA1a93c1b124e4868268344aadb4e340e3a440c44ef
SHA256f178bdebc1c1c3c4de5eecde010a17c36ca64c5153cd6dce33508319c0eee870
SHA5120867e6aff4074673251a8793bf1d92a8418f357eb05b5476b34a0d012486e506247f8f5b586e5ff063c59f76e70830ed3ed3b02445d28500089f07553f9b6def
-
Filesize
11KB
MD580665494d44562789e7dfd8561789ff1
SHA1b944b4ca202dfdb66e3cf8c186c1c9f7c7002310
SHA256c865a42b4c5643a074e8aebbe3096e2e6c4690b1dedb1610e055fbf91d2a2e72
SHA512dfb46b70ba0020cbe4dee5076e084e697ac39606b2cb4b2513d74dc6366b1b1b77a540b434f61ef5c46798be4e773513a28eadfc8b4ecba0de32ce3ff5455302