Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
37fce7ee5adad214e14c9622e1f95690N.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37fce7ee5adad214e14c9622e1f95690N.html
Resource
win10v2004-20240802-en
General
-
Target
37fce7ee5adad214e14c9622e1f95690N.html
-
Size
247KB
-
MD5
37fce7ee5adad214e14c9622e1f95690
-
SHA1
40405f5b722d75edf9de25a6c28a6ef01a4824aa
-
SHA256
28d710cc5bc70d40c003e21aa8d92ca27527d4e82c2ee2baaffa84fb042bd977
-
SHA512
5aa0c06aca18c0bec66958d7b8e2ffa27af56f5f78e0f5c77bea5c33704170048b317c93e6f83be1c653f38204f0f6c248e25865b9378f753c54b29929af4c85
-
SSDEEP
6144:8+eG/Kst0eATTc5hbkOWdwy/GNYMwhW2yYoHtBi8ip6VLvTA3:8+ect0eATTghbkrdSWMwhW2oNB9VLc3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 3288 msedge.exe 3288 msedge.exe 464 identity_helper.exe 464 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 624 3288 msedge.exe 84 PID 3288 wrote to memory of 624 3288 msedge.exe 84 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 1200 3288 msedge.exe 85 PID 3288 wrote to memory of 4052 3288 msedge.exe 86 PID 3288 wrote to memory of 4052 3288 msedge.exe 86 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87 PID 3288 wrote to memory of 2796 3288 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37fce7ee5adad214e14c9622e1f95690N.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa23db46f8,0x7ffa23db4708,0x7ffa23db47182⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13065453461396883440,7732641015920558433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵PID:1516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
693B
MD5a6c4a218b743006b6b73e8658b95dc97
SHA184bf20439b4b15833b20ec3f47f284c3ebd176c3
SHA2568a98f503e0d84d149c4be917e9b360feddc8dd88b79dcec651a9273cfc003ea3
SHA512f1776fc358458d1242da1ea10ac687a33f1d2a20ac1aa39ec5b423c90a597d11c26eaf6b5fcbd4dc379cea5d32893f6917c0ddf4da824a65c64a0e15fbb72b15
-
Filesize
5KB
MD535d7473934286b9db925dd080daa1aac
SHA1d5feb167308648daf35a155ce77568bb19ca5535
SHA2562323437ee682b4f3705cd2ef2a6ec03945921bfb00c7fa387c57738a3e2def0b
SHA512b05383e8d8c6ffeb8ca90f9827f5fb38eb98f099df29122d63ef568900dbcbd32b6076bd717d8d38b48520f356412894091704da652c1acc23e2a12ce34cc10b
-
Filesize
6KB
MD5c4aaf179612f4bd6730535d2817e6973
SHA130eacd68c05573f594d0e9a701ffb8dcd1c96e1e
SHA256eb18e667bf388d2a779e1885f29483d07b20ec632c76f032ccc3426e2763183d
SHA51274173be6e0b17e8b08b9ba4e75948a09ef3989a7dfbf1f6975c707f4a76afdaa485150e6ac5d0560ab42752cb692d735152b266c08e363bf7667414ae1113cb0
-
Filesize
6KB
MD505e40d7d81505046c13a00afa648000f
SHA17bac7ef82ba884a05f3cb09c5b17ec2b9d0e8043
SHA256889301c396c371621a2c23c49f2782b34714420a740d8320c66ac6679b9910be
SHA512a69e54abd0d03ab69ddd2b90164090e00dad536864d3e56edc23817160e8f248e33b4b5292b5577e2ae91be82374252f3fd9990eda587d68f72cf2cea4171058
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD550a460c0cd4cbc1030522601473387b6
SHA18e48d14634aa9c33546aa39bab9fd270375ef0c8
SHA25676b2178181b2df3bdfa3caeb4e0b0450c57a9f3b40ccc4839c3fc6025f1e4b9a
SHA512a59c2e26f032860171c21be1ff347f8ecbc28162a4642694e8be4f208e9fb2a1f05fce16ff5068c08560163fb371db45369ebade80d141a32d87e5a174b06028
-
Filesize
12KB
MD5627a17c6009450e21234c170ff87de51
SHA1eedebfd82282b47ebbb17d688fbf9ac7715469e1
SHA256e74ba0b11461b8d38c0dc263944ae9fae3920bd3b9fffe4f0b8dec9aa7b1c0df
SHA512baf89db88ea516639a37b570734b6fe255721efe97ffc4415e70add55c812b55b2461adc6ab8c2e68640f13c86f446624e8cd9a1b4f3a1958e3d3b0fd6d2baae