Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
TeknoparrotGamesFull.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
TeknoparrotGamesFull.html
Resource
win10v2004-20240426-en
General
-
Target
TeknoparrotGamesFull.html
-
Size
258KB
-
MD5
ac95b5c61d09896a00ad00b172714e3a
-
SHA1
6bef12a057de75a3d5d72d33d29c3a7f5a7e402d
-
SHA256
caccb09b102386ce0eff2fabdbc56f091c6bf3db25db65deb43c52d73407c040
-
SHA512
13cbb7c57333a925a2e083acb2110f373c0ccb99a3b13d9ba5ebcb5206e893e6a64a05d07a65b4f4e10da6238fa0e211446812a20aee3e582c1648db6c5d1841
-
SSDEEP
1536:81eWQaVN7HxYfiV4bRCSR4DLllPnW7y30vD932/s4DyMu6MxTwD5egWYV9AHHDSJ:81eLZfPR1qllPDbsMGxTU5Wg9NVLz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 4864 msedge.exe 4864 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1508 4864 msedge.exe 81 PID 4864 wrote to memory of 1508 4864 msedge.exe 81 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 4616 4864 msedge.exe 82 PID 4864 wrote to memory of 2160 4864 msedge.exe 83 PID 4864 wrote to memory of 2160 4864 msedge.exe 83 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84 PID 4864 wrote to memory of 4380 4864 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\TeknoparrotGamesFull.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc53246f8,0x7ffcc5324708,0x7ffcc53247182⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,578620901363356314,16400799186887173995,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5369cef0f71d5827c2c4ea3b1a2db4947
SHA1bb32dbaec8bdf334ca145fb21130f5fc0e46e77a
SHA2565bc33fde02afbbd6aa597832f58e97bc81e1be2120ca4107aee504d4384496bf
SHA512084b13f46f2ea8f036c28e809ade101d214f08cbfb1945f899b69031357b7926bb88cedd5be09966d028a682c933f045d81f72ca20d920939389568b999f3f61
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
257B
MD5a3302b80b2ce1805cdf6e1c58a4fdd35
SHA1f13f3ceaf1e9b52f461ec33e7beab92b704c5cbc
SHA2560fe499c642b673a60ddd7f0177abae212d8a17b9f31f0da33211f627b841daf7
SHA5129f616bd7ce8b07b4c1b485b368dd9c4f05e6fe830ed62f48efaea0c2e1f42a9e2e64e2f290fe3ef9e6d725af80f5806274da819a352d38fd2ca95341b5331e94
-
Filesize
5KB
MD5bf36a6ef3aa21e21fe47364406d28a0d
SHA102fcc1263efa21146b6e1531f6daaa70d2bfdabf
SHA25668a9c4c0e8f58da8d3cc5f0b22b6c88b23d108a5eede49cc21cee6c6fea7213d
SHA5120f8dcd603007ae007d6c0801c4612f617f1c7255709037bdf06cb9f7aec0d36f2b7798d2694124e3374c8c58f22b6d1f66f8f3ff7b34e91648b4702b5d9eecee
-
Filesize
6KB
MD5b977690d20d215bac38a4078024a2cb2
SHA1eb2fe1d20e88a2206e3f016c24aee802b57e814f
SHA256ef04bfd846cb85153ceabea0c81537c592853f4b8eb5568be06f9dd0db0d2f14
SHA5121f2cf328c2ee9ef4c2412a655d8bbe189069de416d92f3874509feca185cb4d33cc812f5f7ecf87ed0291ebf099a06dc15e71a5b8ddbfca946dfe85c9773b9b9
-
Filesize
6KB
MD5d3d9afef682d3f58784125ca0afa7158
SHA1fbcc0f0c2b931e0cfcb22b2c37f56ad1eef04ffa
SHA256058120d5d2189d752b6652834734fb73c447dea07fa889919e9409cea5a2a2ca
SHA512f5e548763f599787bf501558caaa45df6a70db526dadbf5f21babf66e46701dd9c1c7b680b8a80e9c32241df86c7942f742bd1ca022fb6adfa40b0a11e85d4c8
-
Filesize
6KB
MD5015621a40b7a34f58f18bc245f8b0af6
SHA19f4834074ad17227d1c581288593bc31cc54e1b8
SHA256c19b27e83f7c7b211cd26805333e3f4cbc727e2893cc485f909e454852aff600
SHA5129d7e5b81d08e260256c9b4b6e5de63491ae2cc97cd875e3645405411258bfc9da90773f441c608594b7a0bffcdf2b94f350703646f6d88a8b6ab7df07355b608
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389