Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
217KB
-
MD5
e296ab9f20149e8f7bc8ade7cd4e421d
-
SHA1
217316a52c5e133394925119b3550128bb2f9670
-
SHA256
23c84f1e158040bbc57fc23e9e23dd112d57add113c8088a6b14f185ed1e5318
-
SHA512
d1f5ef4296070481f4884549382b082a3d6d9318cba5ceb13813956b2497501592d07e4920b9dd0bd0b0729e16a9f789369302358b8fdbfa0f2dc167ba643b1e
-
SSDEEP
3072:SvnHgmSs95M2vryfkMY+BES09JXAnyrZalI+YQ:SfA5sFOsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 4020 msedge.exe 4020 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 964 4020 msedge.exe 82 PID 4020 wrote to memory of 964 4020 msedge.exe 82 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1048 4020 msedge.exe 83 PID 4020 wrote to memory of 1212 4020 msedge.exe 84 PID 4020 wrote to memory of 1212 4020 msedge.exe 84 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85 PID 4020 wrote to memory of 3060 4020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab30c46f8,0x7ffab30c4708,0x7ffab30c47182⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,200138612283683452,9459447534049434568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD58ca00646c9f5acf649648d95360201d8
SHA187b152f422f82c20ed18922809e9222a1427d153
SHA2564eb9ee149f25aeb5116cc926e6f9b8e91b9d49bff6b1934e4c961b20155dc40f
SHA512983db80ac895d0596cf98b27a546e2d0d6fb360c243081d2aae150b4a630695ceae147451697906ca51f7654c2a4174cfb74c4a5d90c5dbbefa33a1ac3d11639
-
Filesize
6KB
MD54473f82db61bcdd17d9e80e65aa58117
SHA14358ba5d32613fe4b578a6678a533b7e461cd200
SHA256dba7e3d171da2a0f51a60e1472344ce4327516b72045460f3af80281089266ed
SHA512d74163e17d776871a918fc3fd891c6834b7d753eba6a555f1fe57576ee7f372a19f5722e45a03f3a0f600d02b7a5f5d99346ffb78294250b7ce823a84eec1f9b
-
Filesize
11KB
MD5c1c62b33a07066b7f6a7b2c07c038826
SHA16cc1057a77684034320953147952f7bdb73b9e52
SHA256ca334bf10aadd1f56335fa4636d7c4b8d7e6755bb6786f77765f08d4536a80e7
SHA512ec17ec1f94d4bb61b756be3e7ccff5d2f3eba8e7acf6136e6f0a24e0f8f7c8751c381fef99d940d522fc31a849b741deeeb7ba04012eb23d5fdff1dbf4665454