Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
CurrentAccountSvc.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
CurrentAccountSvc.html
Resource
win10v2004-20240426-en
General
-
Target
CurrentAccountSvc.html
-
Size
4KB
-
MD5
06affad6813ae2b0158a9516eb0da01a
-
SHA1
aeaa5cd1741f510dd1d50e5139b7d5c30793ab73
-
SHA256
964b30047ddd727984321ab8700f8f4b9dc3677058a22ec7ceb200b81212ed0d
-
SHA512
277515f5dac60a43c30bed4d2adf8fe6c7ffd90757543a8f0660bd9d3354cf361f8e820069c2ffc7c4f1e447c4a8b5bba80d5d4d4e5a5e02fb4329ac18111125
-
SSDEEP
96:oSTJBHBJDJgJLJpcJhCJz+aCJzkvJd1JzUJcJzLJgLRdlj4Rr7BrloCFREyRUswr:oSFNVM9OAOUdDs4JARdlc3rlpnRC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 4604 msedge.exe 4604 msedge.exe 4764 identity_helper.exe 4764 identity_helper.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4736 4604 msedge.exe 83 PID 4604 wrote to memory of 4736 4604 msedge.exe 83 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 3984 4604 msedge.exe 84 PID 4604 wrote to memory of 2244 4604 msedge.exe 85 PID 4604 wrote to memory of 2244 4604 msedge.exe 85 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86 PID 4604 wrote to memory of 3116 4604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\CurrentAccountSvc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5328260729289318657,8433267874387328608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD54a9afdfc6c9bc57be64a0d5d904bb65f
SHA1f30af4ac47c070fb370d89eebfa4ea66af69b8d8
SHA256958a9977dfab09b4996b0e90a23837e5301f278fe7d247570ae8c7b8b36c7331
SHA51241fb3db08fab01cee9210a65e6731e4b72517f0432958865c3c2b61247a2680a992155a68202f450a17ffa42b52d6220d4b9be997cf37ed4012c85fee07a47e4
-
Filesize
5KB
MD54773855699e744c609beab38c10cc049
SHA17130b3a049b30d2962b0a5d78e307da97acf3bb0
SHA25602a64fcfd8c8c421dde48efe7796d4936e4f1eb82262279c51ec4f28a93e8ecc
SHA5128434687fa912b98854c71ca3c3448355229e5afcf7946201b9e69e5b09324fed9ddbd376a2ad073eed228feba61fcdaad33342f4498e2824c60dd06393e89034
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD51e305340a9c104a1df15fc845481684f
SHA1ef6de61b851a272e024d18e499910f8ca27330fe
SHA256236a23d14df12dce0724c900f8f6d2480ad55a658832755edcaff5d8474beca6
SHA512cbb9ea0f996bf5423acf89b08121bcd74097c3cd7d3507be19e07f0a014dfbcd50510d1715a25efeb4e84e54d416ac4b98ef82d9461f083bc8903c0202bfd4f4