Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3pictxt-v4....vp.dll
windows7-x64
3pictxt-v4....vp.dll
windows10-2004-x64
3pictxt-v4....on.dll
windows7-x64
3pictxt-v4....on.dll
windows10-2004-x64
3pictxt-v4....om.dll
windows7-x64
3pictxt-v4....om.dll
windows10-2004-x64
3pictxt-v4....el.dll
windows7-x64
3pictxt-v4....el.dll
windows10-2004-x64
3pictxt-v4....xt.chm
windows7-x64
1pictxt-v4....xt.chm
windows10-2004-x64
1pictxt-v4....xt.exe
windows7-x64
3pictxt-v4....xt.exe
windows10-2004-x64
3pictxt-v4....d.html
windows7-x64
3pictxt-v4....d.html
windows10-2004-x64
3pictxt-v4....nd.htm
windows7-x64
3pictxt-v4....nd.htm
windows10-2004-x64
3pictxt-v4....��.url
windows7-x64
1pictxt-v4....��.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
pictxt-v4.1/dll/Advp.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pictxt-v4.1/dll/Advp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
pictxt-v4.1/dll/Common.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
pictxt-v4.1/dll/Common.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
pictxt-v4.1/dll/RegCom.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
pictxt-v4.1/dll/RegCom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
pictxt-v4.1/dll/SelectPanel.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
pictxt-v4.1/dll/SelectPanel.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
pictxt-v4.1/help/pictxt.chm
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
pictxt-v4.1/help/pictxt.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
pictxt-v4.1/pictxt.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
pictxt-v4.1/pictxt.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
pictxt-v4.1/support/add.html
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
pictxt-v4.1/support/add.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
pictxt-v4.1/temp/send.htm
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
pictxt-v4.1/temp/send.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
pictxt-v4.1/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
pictxt-v4.1/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
pictxt-v4.1/support/add.html
-
Size
2KB
-
MD5
22737f595cdee071defecce8db29d768
-
SHA1
e57d103c4013b1a42b02b2a49514c2fcf4041594
-
SHA256
9cdc2eda9f5a269ec51ddba2cf0ca6d9f546bc57fb916422d715da56995cb783
-
SHA512
d829995ca85e2e36e9ba1a21e19bd3af3c1dad5f36832a532492bd74d414b22d35c289fee8c04785b7acc941c1103c1d6fca59c998144265fbb37f843519b50f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4860 msedge.exe 4860 msedge.exe 1368 identity_helper.exe 1368 identity_helper.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2884 4860 msedge.exe 84 PID 4860 wrote to memory of 2884 4860 msedge.exe 84 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 1684 4860 msedge.exe 85 PID 4860 wrote to memory of 4216 4860 msedge.exe 86 PID 4860 wrote to memory of 4216 4860 msedge.exe 86 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87 PID 4860 wrote to memory of 2836 4860 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\pictxt-v4.1\support\add.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff904ef46f8,0x7ff904ef4708,0x7ff904ef47182⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18381367699629161378,7861170867451104474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD57e8ccd34433fff4e3310c8467645ac67
SHA1252e95ac6be882f456fe37c4a010d251880776cc
SHA256ba6caf16e3d9f3014c06cea035f44ddceb5f8870914ae6e313a914c68ae5ad98
SHA512e590ac256080559617c09f6022b2c855e8d2d93c131c361c0b84bfd2cd6781c66ead63af78a4579fdbb79c9a664e956471b9bd71050ad1a7ac3de2248ad8d4cd
-
Filesize
6KB
MD5af99960d10400e63620c8cbd4cc56f38
SHA1f8ff4409353ce2dad4cc6731c78c40fc7b926dc9
SHA25609ca698f513b8d38cb45410da64903fbaf658f4f7c652139ef72e885e8d22062
SHA51291f99dc0840ceb4753e29157bc286fb1bb25f8fc6f89771654288cd84fa65aa8ab7decfd3c9b949370224c78f398ee94e8d093f8fc8ff247342b1e6e065bf905
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c6902b003e559612a18beab4a56ada2e
SHA19527af8a77f6f95a392f3663801103a8b598ff68
SHA2560a48d5176c6f0e21a7c100f36997b6a834b5a92c2f7ca03f312f884d46883128
SHA51212e7431296ccf1081cbaf53450eec640c3c19038808a41d5b7a804d398b1a8dacfa69f9ec955d9a45c4081518b1587dae9c7fe1e29f9c2c45534954ce1ab0da5