Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240419-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
efdd342f309f9e5e3925aa8c727e6c5f
-
SHA1
cbdd7a923bc6fdfa65ce34f8e6928a40f6ec9dc9
-
SHA256
925a457a47574d3f01f22f9577bebf0539a354d251ffa6b84830d42ed23124a3
-
SHA512
591a8eb23b60dc38a2a9370ed213dc9029218a095da043e9ba5deaebd93b934aa0036a10ac49c9d88a055fba6e32d415496b1b483b77552290f3957068b52f5b
-
SSDEEP
3072:S/z/tymQTlWFyfkMY+BES09JXAnyrZalI+YQ:S/YbbsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 688 msedge.exe 688 msedge.exe 4596 msedge.exe 4596 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1192 4596 msedge.exe 85 PID 4596 wrote to memory of 1192 4596 msedge.exe 85 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 3828 4596 msedge.exe 86 PID 4596 wrote to memory of 688 4596 msedge.exe 87 PID 4596 wrote to memory of 688 4596 msedge.exe 87 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88 PID 4596 wrote to memory of 3136 4596 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff982946f8,0x7fff98294708,0x7fff982947182⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13883378283464713397,12346551561689854739,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD539cd0bdfd2029d01aea9b584cca1323e
SHA1bf349d3029aef73ef45166c4bec2ed90ff13ffec
SHA256aa5ce87d46fcfa3f039e5cf37612a881cf307590b5a438a5af5b90f01b4c74d8
SHA512ff9afdb53e4e4a1870d4c4de781a3f4f847fb78a9c1a0173c356a6a215350ce12a53784081d09e1a9beb618633f5fd018ba89a5d41042043a1adc0300c58a2ee
-
Filesize
6KB
MD5c77076414a1453c6298ba4f90cae2db7
SHA11e73e6d26aa65de9c6868e8852e6709484be2a56
SHA256cd929440aca22d4d5bc704bdabd54f62f078abc0957260872316d9807d0702bd
SHA512ad539fb11189c4f8ecfe4150fe9cff8b574997e58c0b15e88d73213400ad4937cb08d4ee4d70843b50d2eda026d30fd57ff12db2d2b3802dee3438a5a377e0f4
-
Filesize
11KB
MD53a0f8acb1c50c9d51381f1240aa35263
SHA1e63f76be2f1dcf42f6e42b6cefb9bfe4e09703b9
SHA2562a85a0a2d9f05b8d32f08c2b1af71bb55d49561f527b9bb01c2c561d3764f69f
SHA512872b98fd0cc89d5b07b2751265c0c67e31219b5a76be51fb3b42d1831dd552b7e3771cea8faa69d48e0e6cff885317cd698cdbbd4bc2826607922c4a93a5a1c2