Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
42s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/08/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
036916.html
Resource
win11-20240802-en
General
-
Target
036916.html
-
Size
4KB
-
MD5
88bcefe9ba313e198dd95acee212d07c
-
SHA1
516ef677a0f1bc596bfa74185f2ada3feb2a2cce
-
SHA256
541bf20ba5e68ec953d56e608fd84afb41214550266483ce1499bc08d4baeb7e
-
SHA512
a181e6eab007cfd1d51d4b68add5dfc980c6b3244c6785f54594320a97bdd9decb975ec1ac70f3bb5d342d455138786f27cad46bac0f3c1723e15b9f9cec086f
-
SSDEEP
96:7NoFo6ok4QG8bL8oisWsSZGFPqHq4TRJqfrliJwkR4dB4K:7yqBk3tXvisWsSZ+25CliJwZdB4K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5600 msedge.exe 5600 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5600 wrote to memory of 2076 5600 msedge.exe 81 PID 5600 wrote to memory of 2076 5600 msedge.exe 81 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 4452 5600 msedge.exe 82 PID 5600 wrote to memory of 1260 5600 msedge.exe 83 PID 5600 wrote to memory of 1260 5600 msedge.exe 83 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84 PID 5600 wrote to memory of 5880 5600 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\036916.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff6a013cb8,0x7fff6a013cc8,0x7fff6a013cd82⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,15061021821800131447,11984207301133162842,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,15061021821800131447,11984207301133162842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,15061021821800131447,11984207301133162842,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15061021821800131447,11984207301133162842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,15061021821800131447,11984207301133162842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:4200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD5c7478391cab9ca6f6aa7ee44a093cad0
SHA11055bf2c265aa8e19d315313a82278e7ec0a925f
SHA25633e7d32311b6e88978a1c61da2693e956d70d38f58a000c0925cb8ad9f5d9240
SHA5126fe7755b73277d1769a1287d96ede9828f1026c2008a0a55e396f6e374d36a71780a9d3077102147d5698b89458080ebb86fcb361349c3beef105e46192ec07b
-
Filesize
5KB
MD5d6714be0ac6627a4fcc1d86a23e8c826
SHA13c0b196e515060c4296dffc1e3b64b2576d26220
SHA256f61e23be7260fb49d5b2a182649a708601ec92ca54f2019b6fcea317c5900e6c
SHA512b80f3de8d7c72d7e1b5b628da7114a5d116166aeb90ab225218aafafa7b5502fcc20401cf0306732e2884a6de0b9485ce0ad90211094d2984b1d142b95e61dd2
-
Filesize
5KB
MD5edc8b493b8db0b2c932843fb634cb5aa
SHA10f344937a2ade759b2b7a85c052989bea593724c
SHA2564118cd07c31742467dbe9de23bf80f668c180cc20ac336fd1d2412c2f8e7962c
SHA5120e8f3a0d9120f4ea2c7f43e2491ac5daf63bf2d846c3f2fee2070a43e83d05fa1c4d99267ef9438443e68d76ce9c0fd8df7d1ccc0d22fa47904f46b84abeaed0
-
Filesize
11KB
MD59e670bafb7e3f4eff5ff52ae7a9acf45
SHA1033350308fe74bf48071544d122664e583bdd94a
SHA25628ee00c2660918e178141492e9b37c2e21e5a5915218ec82f34e1c8150f70dcd
SHA51257b150b8a155a42cb770344a998d10302aae19840b4eddcf0a0bd532a7d8ba7847b386e6f90fd6848d174d3d3dc9fdd34bde17120cd1911c4559a34400bf7d7f
-
Filesize
11KB
MD578d8d9955a6b2c66e30a768bd9cafd6b
SHA1fff22317267fa6481c92865b6eaa94dc5743ffcd
SHA256b76c5017f6557084685c98a4576729ac810955ebfcb56438f33e448fa53bd911
SHA512606f89979489eaeb2be6f5c28f74e356bafdbc976ebb7b899b04c50ec7ceae0ae0763deb4d88184c39408efe9188f565309eb137065deaa73812840cc5b33b27