Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
scanned_juny_2024_44059d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
scanned_juny_2024_44059d.html
Resource
win10v2004-20240508-en
General
-
Target
scanned_juny_2024_44059d.html
-
Size
4KB
-
MD5
cb7ca9bc05ef62d68edc5916f57a12e5
-
SHA1
2404ce6ae205ed955d59e753f71726771bb48abb
-
SHA256
1cf98e98d49e2582207a9133aad96b468acad8a321a13952e5bcdda79ee51c86
-
SHA512
22ae9093ee1eded606a529c7bac4291b86c20641ba05b2f2ac8ac5c5847c5ca9e285186372e98b18fdfa89a73e0c07532995a81fce330af37ba94a259a7f73f0
-
SSDEEP
96:qqYxrxDiFxdogMYUwRMY9UqMY8CNDqIPRA1G54Ky3Q2QfMuZhUibOaS:lid4RMG9MFK+G5IQ2QfQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 2688 msedge.exe 2688 msedge.exe 1860 identity_helper.exe 1860 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4884 2688 msedge.exe 81 PID 2688 wrote to memory of 4884 2688 msedge.exe 81 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 4588 2688 msedge.exe 82 PID 2688 wrote to memory of 5024 2688 msedge.exe 83 PID 2688 wrote to memory of 5024 2688 msedge.exe 83 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84 PID 2688 wrote to memory of 3300 2688 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\scanned_juny_2024_44059d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe401546f8,0x7ffe40154708,0x7ffe401547182⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067012276187484943,4009384695508165557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
264KB
MD53a4a6a5e0a9a6e20794a087bff3f84fb
SHA188df3ede2fefd005ba53b13df3d0c697a9a60eef
SHA256aaef22496c42b75dd6eb917d3243b067359449baac29d3dad60328d2c78f399d
SHA512079cbdb64243715a1cd7b28f8966266df208f51a4cd2c57ba8a05639a75d4dbe058c10197bd30e35049aad6f35af6276ee0fd084c9b2951c37f684ba1bb73fb4
-
Filesize
5KB
MD54504e45c02b66ccbd5d93a8315bc67b4
SHA1bc2541e9e83f42f65319a9ac410df7fbc46ebea2
SHA25659120e44a714117ed012043a55f0da3719275a6297e9a08e263b9e607b211b14
SHA51207a9cd41a0d99a88e3d657c6314725380c2a8ddd7b14dfdb73fa0eca3bd0e283780430412affe5c8ec0914da057f87b6612fdb776eec71a9d2c12c32b582d82a
-
Filesize
6KB
MD57c55751e2ca0ebb931877a8fd18a8322
SHA1925ca886e79795d60e10f644404bd71036111e14
SHA2565a3a905ff02b9c971fe4c7343e95cd97f72e507aad5e239908725fbadd789186
SHA51209226b8399dda567298628a2c69833732369d85978c1488bea2e2f8af7d2dd3e4f249f6ca7117d4c0edc489b21abe5a2abff35088253e30a2f50ad56a3f9a5c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD536b7fdbee725c6ccc4f81096ffb465e0
SHA1ace7dc86aaab352a754726937cf67fa739a35d07
SHA256455ab1d79dbc0c3b19ca6ed45b85f1daca11a28988bf87fff1fd674c95007512
SHA51231533f1f9700f37c151952742327c314fdf4e0c22ef5d92dd25b57af5a04944c8372f4658399a7c8e2494abe4017b1bc276a2bd92a2fc14ca887722f4d5602eb
-
Filesize
9KB
MD501d1fa85ff6428376a898bc7202f995b
SHA1ce8c7f596a4b97c24588cc23a5c24c4b3e80c063
SHA2562a11648c1f69b69db9116a5fb9ac359d0e3f634e79c4ad364ff0abc36264be67
SHA5128407b0e06e24e6b8d97cb1f5ea1dd61fe148e31b2adc4ff652fc62efdb8f27a5ba418805ea8923f4479bf68ddcb7c8428bc5729d88047d49e9a0a8b13ac60c83