Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240704-en
General
-
Target
file.html
-
Size
312KB
-
MD5
67e7f5848c99fea5d3b8bc70f1777bb3
-
SHA1
066ce75953534243dea93ccadfb5debae647568b
-
SHA256
0efd31961808f1dece990d24f2146ddf346eb2639eba4bbc1eacb3a97f43ca3a
-
SHA512
b93b158c1bfa033594803c4e2111e86510371c1b0b51880706588483047b82dc163710ce5368536124a2a87072cd4ed139c7cfe21f05f9b6c27381b34ee8911f
-
SSDEEP
3072:Pi6gAkHnjPIQ6KSEc/ZHVPaW+LN7DxRLlzglK8VMLk:BgAkHnjPIQBSEW1PCN7jB8VMLk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 3464 msedge.exe 3464 msedge.exe 2960 identity_helper.exe 2960 identity_helper.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 536 3464 msedge.exe 83 PID 3464 wrote to memory of 536 3464 msedge.exe 83 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 5024 3464 msedge.exe 84 PID 3464 wrote to memory of 1864 3464 msedge.exe 85 PID 3464 wrote to memory of 1864 3464 msedge.exe 85 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86 PID 3464 wrote to memory of 3892 3464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2f4246f8,0x7ffc2f424708,0x7ffc2f4247182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17208408879784715622,15654886413708206439,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
2KB
MD5a63066b7597188639cb7fee42b1305f3
SHA119ad20424bc109ce54618ebec68925cf0cebacf2
SHA256a5d7c860d6e98b377f08a95cf8ad329cf37e8378e5bf663044899df5d49d1b4c
SHA512c8d3a0299bec600ca2e70cb31cfa880e107bbd6bcf5618765476bd0d30d4517c78033b9c938bf72561297a9006376bb9b92636f703668f25cc28ed6e96737f2f
-
Filesize
2KB
MD5ffeca7121481bc7bd3fd2b2342a0c5a7
SHA1714793fd391b123d5a0392ed270cc11be3d5e51a
SHA25614d84bfdadcfee0531c8ae8661a5329bfd8598495259e2a092c833c65e7c7346
SHA512393deac1bbdf780f28d34927be5cce4b1d2cb051d87c2dce1e43d8bdd71775ca0b797cfb6592d0d53464141b0e1d4e5ba9f178013a5a25b87adeeae97f373f1f
-
Filesize
5KB
MD5d4ca1d5ad0b31b4027409c1ef4622746
SHA1311daea72977c4b3b860dc027202e695c623fb6a
SHA2565c617079599f6868f07cae6e7bd082ed59801b376857b3a151e2e6676e9dab9c
SHA51233e3ad7e4bae2d3dff2285db1c112e5fb3ac4d38cb04763a7cf703faff0eaf579416c444016d98b81829e5367bad84b8f2f5caa3dbd96bc1997522f3827ac4e9
-
Filesize
6KB
MD546c48920418f8bec62b577f141fdf75e
SHA13f85ae288d5873445a52b965e4998a9e58ba25f2
SHA256ec3f02cacaab11b8a76ef186746877babc0ab50d2b149791e3d9fca7e1179d76
SHA512f1742343dfae9dec14038ae5ffd3826bbba1a01dcc6666c37a3c43668f2ff1477424162670b7269d7281be36a9a802f60902d758d53dbce904ff8bc0bce2e26f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5afdb03f72a772b6b3a22bf705565c6b7
SHA1a1bf3cf686d396fefc1a558af85dd5d2a1293b80
SHA25608024d59b886ac8ec7dfb2c33730f3ca53d3712236e9acf50b3b9c5b591f9863
SHA512fa20871375094a54c4e37379f38f10c44feb422d7b766fe9a7e612a8e71742cf4ded3a2d8e2f8393421e0c5742c421c1efefaf7b9d958c470f8cd7054efe9c96