Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
s.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
s.html
Resource
win10v2004-20240802-en
General
-
Target
s.html
-
Size
93KB
-
MD5
89cc26b334b55a5bc41b5a05212e4fdd
-
SHA1
c4f8ea88b3657abf7d920cf865270c127050c6e1
-
SHA256
a22c059e81e26a14920c0c3acc551626e825002c019825851954a1d1d824e155
-
SHA512
0eb123d45e82656bade92183d48235eb38b7e8aaad6411c17301f3f621401f9388cbbdfbb810a640a0d389d6c11f59167968c1fb72ce8ebe49a64dc195efabb7
-
SSDEEP
1536:xHFSWp4Hu0GqdPcgncjjH0GhBYaL8APizoV9dSywhyd5vfikUo5gWVBYvri7:xHOHPnyHbhBYaoA6y94ad5vak3nAri7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 3392 msedge.exe 3392 msedge.exe 2840 identity_helper.exe 2840 identity_helper.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 1900 3392 msedge.exe 84 PID 3392 wrote to memory of 1900 3392 msedge.exe 84 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2772 3392 msedge.exe 85 PID 3392 wrote to memory of 2912 3392 msedge.exe 86 PID 3392 wrote to memory of 2912 3392 msedge.exe 86 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87 PID 3392 wrote to memory of 3592 3392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\s.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a3d46f8,0x7ffa0a3d4708,0x7ffa0a3d47182⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3508 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12452015242496736540,13855727531200364589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57cd67ea8fd119d1853f4643472d3d923
SHA12329013e26e1943baf8efad2962546cc52dbafe9
SHA25624af530ef168f0f543d108d9ac4499b7f62b034156f4ec9c8fb2284e849fc9ca
SHA512cb879c773e1f4b0c19c59a2d66b80e41a6146e9e20ade3e81ef84f83a06c88c3043691e1ea3115554121b54d472cd8ee133937a160392cf814ddad55ead187be
-
Filesize
1KB
MD5edc6da8046b46b6013df991ac459c190
SHA114ee10fc2c98f186bf20a506fd67f5a219511269
SHA25654809acd8dc54f8b5d08bec069f1b76318bdcdb2d40528c03669a03b402915f4
SHA5120c0414fe9487ac82b70660b58380743bb8c7566207bfd26df71b2fb0b7cdf3d5968a5c680d9a9c836c1932f07e0e1090be47824dc48ecbb8ccb441b6ccab7b1c
-
Filesize
1KB
MD58c9039cf53de3dc0b82e150eeb20a705
SHA1938ef07175098c339634545fe8d80ce7c81185b5
SHA2564d71306d4e8554ffcb396aed6ed7fe9589e815ce0c20b86b15c9770b769f1a88
SHA512d504a9e6b81669515020f731bb1e1172509809bd4613873592a50c0516a84bb6e94c0d1aee4ed39f6336816ffb664cf3568d973f7603c6fbc34bfed8cd56c7d5
-
Filesize
6KB
MD5ebf552200a6009a404b03fb3dad50fc6
SHA1ecc80f53c6fa70d3b6dc205a720df69dfdb04cc2
SHA256489b2e9ea66cb165abb37fa8d6b838aff21566960eeaaa1a8d0c2afc2792fa6c
SHA512bd47c77e4c4cdb7691315aa0e6dc187c10c785735319e4eb20dfcc254e9517d09156bf15e92b075d2be52243cab28caeb4e5bf7db54dc72b834c3586c9846c37
-
Filesize
6KB
MD56bcc55564eee74001d28a68d637d967b
SHA191f140326f5bb5b17138b0c7287aad4a40f0dfe8
SHA2563e5d3ab0f8fc004b19c0b1848d16b7744a8dea6ff11a57e054654b2afc98546a
SHA51257b66a4b70b6314c3a20af86d5d01c0081f844b6014ee88f631b4fc43aeafbef436088e8200298533069a0b76df187f51adf8c2161cdbce72f6dd35db9b20756
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b720233483e2c634fa4a101b624857ec
SHA141cb2f169d3e2adac56f7feab122ccc41eb6da03
SHA256039adb3a00c0bb1ebebebceeb1e906d895ccce2b8ae5e1db13a67ab7d8b7a7b8
SHA5128fb1d1fa5cb06534f722739333cdacaacce6903a301769463c71a0118f3c3ec4165300419fad44947c140b9e2e226d1da4f4cf23c3d1d46d2c5540549c6e7aa2