Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
42982.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42982.html
Resource
win10v2004-20240508-en
General
-
Target
42982.html
-
Size
4KB
-
MD5
34db7f42fc714156d4407f717202bd95
-
SHA1
db707e480020831b5af710bf11e802f998093819
-
SHA256
903d19e0c2a2ce23aed055aa3897b0bc15a976935fa030272b4d852a4fa74370
-
SHA512
f147c7931c2bdb996b6c64c816399fa8741add0a11bf3f19c12156a0d20339ea7c45e12b9e3e4f3d0e0a06db0876b3e2de5576fed6d49d641a1d5b27e8a6a0ac
-
SSDEEP
96:qqYxrxDiFJ5EM2yFUAuw/+YOm+Y8ZqYIAEYZYSMuZhUibOaH:lidpLe+g+FZLLYSh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4012 msedge.exe 4012 msedge.exe 2956 identity_helper.exe 2956 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3032 4012 msedge.exe 84 PID 4012 wrote to memory of 3032 4012 msedge.exe 84 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 3076 4012 msedge.exe 85 PID 4012 wrote to memory of 4864 4012 msedge.exe 86 PID 4012 wrote to memory of 4864 4012 msedge.exe 86 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87 PID 4012 wrote to memory of 4772 4012 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42982.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8433609967035556362,13460955046263430712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:12⤵PID:2672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
539B
MD589de0e9e2bd7a25660ccfa80e16e4990
SHA1f21a333a8a43e6905d109acc0a6cbb925ba32277
SHA25696a9da0e2bec2b4d77a0dae1b93fee98829ef08821c9599b6ab9e6f94eb0c799
SHA5129b85809bdbe78ac38fd10a602defe53954c6d085b5f8e0446d36c264301a7ceb1a6f5731526236f5b67a27691e76474a7249981f4ffe08d69676304d7788735c
-
Filesize
6KB
MD5909f3de7f2b9d0ed6d628082ea177da2
SHA1941b2f4275410f3f699050145e8da4b766a2bd5a
SHA2568f433081ae5664c4cd00feaec87d0cca7a991a55d2f16f6040498094848dfa27
SHA51253f4b40c38188d56d242a6845d63bddb97885c17953118923683a61ed8668d5e1b87867d8250bb9d387b7bd7633de3a8e9c0ab8ec0e2740ca46a369ae36d3afb
-
Filesize
6KB
MD5c63048ffd292fac48eaab6fc3f1f2200
SHA1203792cf0f956db5c354b7c15d29efcdcc0a6ace
SHA256a1ce727f370f8971cc5fd05a21fd9996ba8cf1ea6dc9ea8839e185bb1770c4a2
SHA512d069578773485757f354d8972abc5374bf1362cc16fd41a9e4946bf1d1dbddc7bde3a9bcd9a76182870f922f301a50fbc59548662d7317d2fc4fecf302587c59
-
Filesize
5KB
MD5d969db814e5cf7b49ddc18b6ac83695d
SHA1c1a1dece6369f468b8f70cac87650bc32dccd48d
SHA2561913471fa3785173de189c30fb95d311c97f80280d0b5bce77b10544b9b1bf03
SHA512decad3d6fd420b3f66f15f4c4904922d3c0a4f7a72d3df1259c45e4512fdb56f26e2ddadc822f86de0cc1eff10d4bb2e2d0abf266cda6484080880bb3749f1b7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD590f66cb319b60f27057369aca122216c
SHA1e28afa60c2d5f6cc42f06b049b2895a305479a02
SHA2562c8f3e40d79df761b0a0d9d2d6563d2fa26a433684d53a9386576a710dad7511
SHA5127e65639f6264dd7f69a0d1cb8aa6ec9b63839a894ed2c24a4673248bc2dadad3afe41217329e689f93934c7a8aa17c91935e9493e638af8215ed799309889f53
-
Filesize
12KB
MD5d8fcf936b7cb53628391e006e6f6dfc6
SHA1ca34de8fd4761ce23a18678ce1c3dfbbc328b5cb
SHA256cc9444cbbbdddda68da41ee6d851c0811b073a07fa528b96e1c6088ee3d28936
SHA512447d7fc218dde7080c33fb9cb1bbebdbce3257c16c0b4a6a236c4afd84a4dd3184ce18521e7ca913fb7d1d5cc644af286f4b6c52584f81dfc1eb51c2ddbf3b1e