Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
960s -
max time network
965s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
Geometry_Dash.html
Resource
win11-20240412-en
General
-
Target
Geometry_Dash.html
-
Size
177KB
-
MD5
dfc33eac665d5defd0ae590770cb055d
-
SHA1
dca8b6987c045f80e3601c8e16353803c758e7fb
-
SHA256
24560e7f2cf4355b42e97631fa1147b78c0ab18ebac93a06aa4cd48c06c49d97
-
SHA512
b374cba3c574eb8aa107b396dc82923fccc0a92e02ec6146329e140c96a7f9fd694f86e7d3d3a568cc8fb62dc2e3d173f25ca2365d5528e7116e5f63cf643422
-
SSDEEP
1536:KEmFiRyEVEb3cbBdefg6svEvsvvvevZvNvBvzvQv/qyWrJruTW/Igg3KI8iCXVy4:vbc0n2R1574nA828AW/mNHggbbu0cOK+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 992 msedge.exe 992 msedge.exe 4796 msedge.exe 4796 msedge.exe 2064 msedge.exe 2064 msedge.exe 1896 identity_helper.exe 1896 identity_helper.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4940 4796 msedge.exe 79 PID 4796 wrote to memory of 4940 4796 msedge.exe 79 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 4168 4796 msedge.exe 80 PID 4796 wrote to memory of 992 4796 msedge.exe 81 PID 4796 wrote to memory of 992 4796 msedge.exe 81 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82 PID 4796 wrote to memory of 5096 4796 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Geometry_Dash.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe80353cb8,0x7ffe80353cc8,0x7ffe80353cd82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13245745907057972332,304256402227214748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004CC1⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56e15af8f29dec1e606c7774ef749eaf2
SHA115fbec608e4aa6ddd0e7fd8ea64c2e8197345e97
SHA256de9124e3fddde204df6a6df22b8b87a51823ba227d3e304a6a6aced9da00c74c
SHA5121c9c9acd158273749e666271a5cdb2a6aebf6e2b43b835ebcc49d5b48490cbbf4deddef08c232417cee33d4809dec9ddac2478765c1f3d7ed8ea7441f5fd1d15
-
Filesize
152B
MD53e5a2dac1f49835cf442fde4b7f74b88
SHA17b2cf4e2820f304adf533d43e6d75b3008941f72
SHA25630bd1e1bafb4502c91c1fb568372c0fb046d32a4b732e6b88ce59ea23663e4ce
SHA512933ac835894ce6cb8aac0261153823c96b6abec955173653dd56e534d644efd03aec71acb4f8cb0b9af871962296ec06cd03e570a0ac53098b8cd55657543786
-
Filesize
188B
MD5daeac1a615707216c8876f8f1859c577
SHA1a683da8e468784063bab0843a591d854ba8d6693
SHA2560df76956846e2e658ed342e225cf3749f60847a3e830a45e71253a67477d8c39
SHA5121912056a0fc1c4e928e19448f6360ba3351e3b642cd4c8203638464bd6ba91c7c9559769654b368b93816ca2887b6dbf11b510dd0d926fb2360521877841ce99
-
Filesize
5KB
MD5c54ce880fbf4ca21a91b82b296234e3c
SHA1374586da68f1817540a1a017fbf5d5feedf48c87
SHA256fee9df49718c8fb7ee01d162be4e4d535207fd272532b7ecaaaa3b6c27346714
SHA51204924936c74c8e1477b9c0713294e7281fa93c729751a0b7e70f57f50624963d8ab32e66738375cb920ba2a38a3c57bcdb6fcad9b38a89832c4b839f4ac68999
-
Filesize
372B
MD5a40d1e36a2c167633ca12da295437400
SHA1a1e5d4611d61147c981e3705b91f26a3b5c81585
SHA256f094d15fa14584ffd19d8041ed64a3e90d9f009a9fa3d4028c1819c6b74cd02b
SHA512d65704fd534602c44774e41e0a37d2cd95486cc5437b873a773a814fd963fa863ec8b0cfd0dfcc9c394f218a986d8917b2004db472690db16a529109b34f9fe1
-
Filesize
372B
MD57ddfa5e5e9a6e3d5f4b791dfedd78c16
SHA1bae4f86be7183a1a5f37a317e542d7cbec179a17
SHA2564f28d0f7f42dc82b19a32d399558093d22053d3e92b127432e09aa8c5917664d
SHA51216abdde5b40ac9f031a0a52f97b68b4a4b694741ea38605ff233f1f3e7fc9500634d68ea8b6f9246d3a0cfebd095314a0f4698e311374192090c41054cf6203d
-
Filesize
372B
MD5d3845fd82f7d9e32c4743fc547a3a13e
SHA15a19ffddae215f98fcb2a055d8d1cbff4cf397f7
SHA25680f402a061609bf8693a355458b86e88b82bd2bfe836361756793031050df8fa
SHA5122ce059676c082428b13d2ab50084eebbdce0e2e5d22f9ce6b8824379fe08df104a923886508e58fe2b62c312e76f99e072594426de6af1410e84fc524c0b1f4c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\eff0be3a-9039-4966-8d0f-4eebca0b5d76.tmp
Filesize5KB
MD54263d9682a217e08044b92167eea749b
SHA1bc1f2ac41130c2c8a3206eef682dca2192e7142a
SHA2566c8d709222effd7ba15d4d1f731697c77825fa343f2f189c819512cb16e71923
SHA51259f27d35924bd72bdd2ae42e5c3548eb7aa7fbf3e63f2bd2c6b4f28bc468f4f6660f0ce8a4a65da95dadf418a0e8d6cad2d80b2dbeaea77e3913baaeb8b110f5
-
Filesize
11KB
MD50cce53bcab02f33568d9874ff18f5611
SHA14af47ef8585619168fd508f8c78e0524742f2c22
SHA2564224180e8ad39d4d344ec9fb91becdd7c9e63a040a4332deb091f3e3d46c1ae4
SHA512b27ab5b8e576dcc3c0f8689a1d10f9beae3918dd90bd7c2a5e1e35f7fd7b73d942c7993ca5e94ad2959505e54a3118e8a52c12cfe7ba165e148c4362d7015d24