Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
484s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
751B
-
MD5
6d6069a6adf3e607911a4da8841d450b
-
SHA1
4f1e90d8733a46942884a14f7663bec9f4cd2ea7
-
SHA256
2896e1ebe90347a650c2ea28f23bb6818795d53a49adb7f746c6dbeb8fed1916
-
SHA512
df1d0be59814c438afdffe4a167e296a03bef0661f51945538d9013a5b17815a1baef798df502332e520ac0dfe092c7b04840c3bdf44b39cc0d11d5c82669e77
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 4632 msedge.exe 4632 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3892 4632 msedge.exe 83 PID 4632 wrote to memory of 3892 4632 msedge.exe 83 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 948 4632 msedge.exe 84 PID 4632 wrote to memory of 1440 4632 msedge.exe 85 PID 4632 wrote to memory of 1440 4632 msedge.exe 85 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86 PID 4632 wrote to memory of 2644 4632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80fb846f8,0x7ff80fb84708,0x7ff80fb847182⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14931704450170754958,14828005563362450620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD557ffbb5da8f1ff9e29af6713fa4d928b
SHA11a89f0b96b9c789eec518ce24c65c2b07eb104df
SHA256726ff3ec7b16c6657beead0c0f6cb3e66f30ed56bf16e99a5b68ed9cec0b7b5a
SHA5121efd735fbe881c218d14b17c9739f68e45ef75b3919022f3ce63e70b70d6ac2fdf2d213b3eadb4628b3c9cbc1d0d7c4b1aaf028aa65b7ad76a6ff41d3b9c0d85
-
Filesize
6KB
MD537a640a5cb531a8c64433b86a5799fd7
SHA133b3047187265e6bc80648c40a01d88b3a583ddb
SHA25631f3f7573aa27b7b2cd7f69d64f5350ea2daf1dff930de018e82721d4873444b
SHA5121bcea2bff9ae03f0c519be31ec27707587438243c4a89bb3b58563bb6436b427a4c132c02af301d14a56812e5082ddbb28c5a2179fde1ccf00d750031af2cd95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD562f4257c6dc16ff363a3f54e02f6e163
SHA1a21ef67a8f59690652649f6c57d0782b32abcbd1
SHA256f98e0d17db84ec3f2b6c66f2a2913136994631ce435525f3003666769aec0c8e
SHA512afa18e2fde39d0c46d71ee2c04bb7f17745645af43fd538b243a0e483743e761fc30666bfd32b97f9752575250e54000821dfef226eb1e784e6fd3c89135b9e0