Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
bKDkt.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bKDkt.html
Resource
win10v2004-20240426-en
General
-
Target
bKDkt.html
-
Size
18KB
-
MD5
c6c8fe20a53d0dcfac4e26ad7c2a3363
-
SHA1
0f28a887526a6066fc973875e3c096cc4d7fb9f0
-
SHA256
ae171737edb0f7cf8c74a771911c5504ec044b3e93dd7153ac451505545dd047
-
SHA512
8976563565a937bee103358a9760333c2cefccfa7965b7433469752bd3ae9d5a438ef11fa21ba38a84e4ab3c43757d9b456e92b084f758215d2f99a1cdcab871
-
SSDEEP
384:ACBldovRk8Gj6J4yArAb+9fJxIL2iKv3grRTiXjMrvN:ACBldFj6J/Wq/2XjMrvN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 4440 msedge.exe 4440 msedge.exe 1116 identity_helper.exe 1116 identity_helper.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 5056 4440 msedge.exe 82 PID 4440 wrote to memory of 5056 4440 msedge.exe 82 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 4008 4440 msedge.exe 83 PID 4440 wrote to memory of 3000 4440 msedge.exe 84 PID 4440 wrote to memory of 3000 4440 msedge.exe 84 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85 PID 4440 wrote to memory of 4036 4440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bKDkt.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc310b46f8,0x7ffc310b4708,0x7ffc310b47182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,534322036244430617,4674830058410790269,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD54bd89eeff379cb39ed9e307efdd722e0
SHA1b30246ea7a452788d6d2d87403035c657d4cd67a
SHA256ac70386eb404890410393ab2d6c95855f0e91ed027acb67f981e8235b39c8588
SHA512ed5b80a132e56e30da87c41fdfddc33201633cd247713e859cb52c4db541bf1e5b93c5a0960cdbc6df616377efd4138414853e9f6f4d529d5d96ea60d98f357d
-
Filesize
3KB
MD5ebc376b2087d299bff052672949e6d2f
SHA1d953571350e52305ed648dd242b0f7212e886bb0
SHA256853f1d2eb8bb66dd682f0f7ad135a97259a16b4e297bf01ca71488a2dcb26a35
SHA5127a2b69530c8422ced1de76c3c5cfa13497df98f298279cb776b32c72444f594b0ab9a59501362654f9cbddd40399300970b08028bae245e6480aebe2c08cd6e0
-
Filesize
6KB
MD505c6fcaaddcfb804c4bc1b4968abda73
SHA102adf10dd114fc4722f0e730e13c1f6c9ee19aa4
SHA256cbef13a69621b8212443021ef087f455f7439b8958746ed0d3b2abeec32cf8d6
SHA5122c470bfd79d62edb7e4859a8dffeddb8498e85b186955a4dd185fd9ff68b79fc451808de0c0c6de10220524db5b6475c7cb09cb03f25ac0fb9ffb216a644da86
-
Filesize
7KB
MD57ae56ae21b731690216be91a1f928e94
SHA1a1caa6d170dd01c7915a4495cdc529dab31518f4
SHA256303836974a77ac3ec06c3ed941359c4bd2cf359f25b4d259da8d43fbb6944ef0
SHA512adc0baf91995afdfe76fe8b365387b10e55e54b55656c3358bcdf7d8cc41b63ad09bf8d42b891cb066611a1f5a87d0e3b1bbb443d2bbf59d6e108615e92871ff
-
Filesize
6KB
MD5fcc64f2ecc7936e9865624eb249f5857
SHA167fb15f770e2c6dbc317d31eb2988d34d65b0f18
SHA256d66a3f0ba558fb230fec295909d73ec7a369f3df7f22d29063b4dc00fc9ba7da
SHA51287a4272f5cadc15352d6e84bfa2a71b9db2511de644c0ca08bd05448b4eae39fd8c6dd9e727ad6706c18738793b1c728cc49570c6d766e58c9e8e67364e50e66
-
Filesize
1KB
MD5fcbe076537edbeca1f64ebe7ca705964
SHA158ec3dd06606b2f112ffed556d93e6bdc8864ca1
SHA25696a76c149021396c36a4e35ea656a8919db9b7c3c38227f4177057db0ffba403
SHA5123bf2a4243a203e1b882549e2af50a22e5bd74498161a9b436ae52ae13538c2818e2b1fd77d90762e462f4f2d7f85766a88039ffd1a1bf6477a79a5c8cbea5e02
-
Filesize
874B
MD50f4a10032f35c001983b180047fa1ba1
SHA14f2fa52bb0b45b91e6eaf8a5b0fdb4d231eddd8f
SHA256d9ce41bc55c9c324e5db8d61a190b3063ec46535cb46f2381a42958441b9061f
SHA512a2f71459eac3c81b2ff4905eee4bf82e72bfcede34cf2f2c9ae9e956c870763ddd03652145b12d5416ee9af33055e96322f655fe7adf639d56f9dca48f0fcb74
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57362633db55d05b450e1af2b4a9b82de
SHA1f50738a67980ba134273637f29bf9dd5cc2b40a9
SHA256872602a787d743491bf814310e90b96c779d63bb97af6311e5dd35963f2f9d8c
SHA512c4095b47442021bb66527d40bdfbea2bf8488758fb8ff3343c150b2053ab76c0a5deab22861099cd670cc28b6d7fd8d607bc1c64b7c435e6cfacf87d7a84c544