Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
f8e52a6a4b87f05e15ae202295b111e91649d9ded2ac68ad9e6461cb660a9214.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f8e52a6a4b87f05e15ae202295b111e91649d9ded2ac68ad9e6461cb660a9214.html
Resource
win10v2004-20240802-en
General
-
Target
f8e52a6a4b87f05e15ae202295b111e91649d9ded2ac68ad9e6461cb660a9214.html
-
Size
202KB
-
MD5
5664b8b87f55656106105da12f80c1d2
-
SHA1
73fcd137460bf16461ee14a2ade03f4597056245
-
SHA256
f8e52a6a4b87f05e15ae202295b111e91649d9ded2ac68ad9e6461cb660a9214
-
SHA512
83bd41440424c1a9ef66f37a55320fdc0fff7a975dd073e1c2011910cb4da0d161b8b922f7885271bd80faaf7922ea4a7768968ee5698d6078d0d793520c8b0c
-
SSDEEP
6144:dKm62Ez8hJKvyi/EfD2EXDAixGEkvkqW1TjKFPTWITTl4kd+4TKahT/YN6KtkEaN:Im62Ez8hJKvyi/EfD2EXDAixGEkvkqWM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 4020 msedge.exe 4020 msedge.exe 4980 identity_helper.exe 4980 identity_helper.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 4440 4020 msedge.exe 84 PID 4020 wrote to memory of 4440 4020 msedge.exe 84 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 3976 4020 msedge.exe 85 PID 4020 wrote to memory of 5112 4020 msedge.exe 86 PID 4020 wrote to memory of 5112 4020 msedge.exe 86 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87 PID 4020 wrote to memory of 4804 4020 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f8e52a6a4b87f05e15ae202295b111e91649d9ded2ac68ad9e6461cb660a9214.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7afd46f8,0x7ffe7afd4708,0x7ffe7afd47182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15673987069706801290,12792225386339545408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD53e3a8156f9865517775bf21e3fa24df6
SHA1d26c43b72bec1c87280c5d61385a6b8d24beef46
SHA256e27f0ce8f090ab286d09b17b553819b00146ab8531d55f40ccc1c1a0a9fed8d6
SHA512f92890d2c083ba9cb5e586f1aaad9e5cf8948d533a4041cd47b1b2b0ff07f5c98f63a83db55fe48fcbdb99c8cc0257c9691638da36a2fdb3ba5b1453604d01d5
-
Filesize
6KB
MD5fc386b2b7c2094e64c5ecd0fd3e7bbfe
SHA168432641429555c4f4ecf79463a147088f9d1cc6
SHA2562bf8412d6960bbea92394cc3b001fa41f9c07e86bedf2b2d59aa03d9d1af9664
SHA51211cf66a35d574ea0d85b8f864e2cdc88863f9af0591dbcb421d5fe03e3b4e8f4b6cb7bf3eafbc07ee7b46445522de28205ef4807b05a47da9342a96b42aa05c6
-
Filesize
6KB
MD5df71448541fd9924fd6d4bf7a8a96d57
SHA150e2fa033e185caefe10fce88b9807a6072e9e28
SHA256c16ec080a41bacf53ced2d5608bc5be6bbcb0a6ce12b8f47e917dbfe46d87f94
SHA512a327d80a034c8bf72cc06e0cf3277d288ef7351bdee4a69c0596d9e4b9c81391a3b835eda1169983a31d7b6dd8f8739a3145d87e20eb9c2cd1711811cf34615e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD568aa12e791a0d9862bec3dc09ccc9b55
SHA161f1ccdaa6dc6afbbe568c9823d9431bde2d69fa
SHA256833a60a020153d28058847cd816bc0c777827b9b1e564256062d479b999df649
SHA512f7da05cb636fc5dacdfb26e5ebaec0c5e330f674ebca8ac5000101180e85a95dd69d595d492f7ca0e3ccb91eacae8c96f271b713d402b2eea56433205141788b