Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
797d031e3d3bda1c8ee4ebbcf7b3528b
-
SHA1
4805e582b1d0249a7e49ad23505c8ef3de9573f7
-
SHA256
c7972488574b33881473ce06464b5fadf5317922e3c7409e480f59063eeeb081
-
SHA512
8c57302e26c5d8fdc393b2a401e705d915fe3fc351d7a3e75735f86b3850b1c66e55cecb74bb5c6e27739071dd139f39547882534375da17371dfee38e893a86
-
SSDEEP
3072:S6Lpf80rT0y+HyfkMY+BES09JXAnyrZalI+YQ:S6NHJvsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 4664 msedge.exe 4664 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 3016 4664 msedge.exe 83 PID 4664 wrote to memory of 3016 4664 msedge.exe 83 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 2012 4664 msedge.exe 84 PID 4664 wrote to memory of 1856 4664 msedge.exe 85 PID 4664 wrote to memory of 1856 4664 msedge.exe 85 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86 PID 4664 wrote to memory of 2620 4664 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,587850654385401666,379296848186031566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5e2d837fd8bb51c29a3654fa15bdc2adb
SHA1ce89f1685dcc823fd2ad4bdd8ba1b01f4d701a6a
SHA256ac7bc0930d227d8cf372671c6e551a539a737a3fa92fe5fcdc1dd8dc1dde85fa
SHA5121ef98ac6ea13116f7fc237d56398f052be3f0e059d15f583bd2fc0e467580f7ad5c4c983bbd48a241e943abb0f3db28ea96bbe4304a0ca0f3b075a875846cc6f
-
Filesize
6KB
MD5ddeeac985a94e970b00f8ec9ec8e91db
SHA174be238ceef4bb73e0a0439b7c7fdc77d5a09924
SHA256d40d85a664a461a41ce2d746f202f516cfda6bcd361cd4996ea050ff733bd442
SHA5129d590ce5d5b8157b2699ad18a26784a77b7f9232f5ce4e32db4e38fe8605f931998846bc099dacac338384b6b70239c529cb59895e39358d61ca37a4d29d9ef0
-
Filesize
11KB
MD5e4d2779a16ec8b8a0d6fc183bfb94447
SHA1b9a556755488d15f1d8d0a11952c8ec9332de5bf
SHA2560263067ea8c89c2965db86a80597cf35a3162193b9f1cf66d8a5786038947431
SHA5124673ad5b0a4ab2c11f16cf123cfcc8a859776891c8c080e186e8997612a373f471b19edeeffca1737ce803b9c2c9c7248e2c64c00cc612329d707c1645060cdc