Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
Parkland__AP9584839.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Parkland__AP9584839.html
Resource
win10v2004-20240709-en
General
-
Target
Parkland__AP9584839.html
-
Size
25KB
-
MD5
c39819a6670b66ae413fd2ef26714610
-
SHA1
50f5dd40a90203c00d07b34ca8ac10e0b2d617a7
-
SHA256
1394727d777614739413eb0e91b4d077989e53808f41736e2a94d7cad26742ff
-
SHA512
bcc36a5ed95fbc34bf653f47fd115611ed93412da4631e6e8d5cceae45a52763f04513bb6717330a8927b9671ea9b4cb85c3002eae33d66d87b5febf62348956
-
SSDEEP
384:0QSmJWudNAWZ+o00oxKfWtjCYAFXfZ697ecWLr7UjmEB7v68MJyjXei1e:0QSmJW4NAWZzJVfWxCYAFXfg97XWv
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ipinfo.io 17 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 1072 msedge.exe 1072 msedge.exe 4172 identity_helper.exe 4172 identity_helper.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2064 1072 msedge.exe 83 PID 1072 wrote to memory of 2064 1072 msedge.exe 83 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 3252 1072 msedge.exe 84 PID 1072 wrote to memory of 2228 1072 msedge.exe 85 PID 1072 wrote to memory of 2228 1072 msedge.exe 85 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86 PID 1072 wrote to memory of 1352 1072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Parkland__AP9584839.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac9946f8,0x7ffbac994708,0x7ffbac9947182⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10566533118897489795,2196632567279985803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
913B
MD53690f1640f15d3fe2522fbbde45172a2
SHA183ac934fb7384fae431aab041ecffcd979c0014f
SHA256deebf7a9afb953d9003bef47f2a931e8d7a5fbea38c9585ce0976da928116dce
SHA512a563113d2f73581e8110a002ed909d6fedbeb4071e8f6a239ba5ccedb69206c5471644cd5f6a81af6c508c4e5bb721cf162a751e107a0155103a50b90063aeab
-
Filesize
6KB
MD52b95c788c3a4d149b4f97446bcc87937
SHA17b3dfc16681316b96147618e1bced3fe315e8d92
SHA2560cc3c448cca36d261aca4bdc7d08d3fdf2579064002baafca876ae7cb610d6c9
SHA5128c2ede9ba772a6ad8886bf18134a85057aa85613757ac4800576a44646bcb35b0fc98843559416c247566fdbd6e8cd0e3b598e65971ecaac61e69a0b84f731b5
-
Filesize
6KB
MD5c722f7e8c4ab98e4b1724085c0810fcc
SHA130c2b3a2e8766a15c34ad1097cfbc701118e2445
SHA256357fe69c49a800c1618ffe38c4a77debeac3f300901ba9efb435f5e13da21736
SHA51277e702a739e9a6d2739b40a86009de0d237f48ee86f215906bc17df33160cefa52ce2bc70904f21fc7b03237c64a458838f19bc21f5f488b8c5350f20210b422
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD520099e38dd5880b74bca91c4218e9e32
SHA1eb5dfd2916fa7d245d9bf6b9fc66751ad6da9dfc
SHA25670838713b1683fa061e175b695cfbabee8b8746f187a61d292e60e6298815986
SHA512b03cab1cdb6eb90123eec17524b8a23a0a881f9eb6c4ab6da6543cd9aa57a7e39c6344891439da0d16d2acff06660732c26a4e5ea620c539c10d68598a6e092b