Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
541b192835c1dca5f976c25774b1eb5a
-
SHA1
a12d124587005015c2bcd99ec829d7e6a5134f03
-
SHA256
ba916d3327dec384bbd16fc0b71a341bb39ba58583c699d5b8e22885c69e1006
-
SHA512
9de06744f392b5761b534041583cda627f7aebd542641d0d21829950a312e1a9cf2cfa69f3ea8254f9aa9ead27052b818aad0d4306f5f77cbc60198ab294ea37
-
SSDEEP
3072:S7+BiCr7rTImyfkMY+BES09JXAnyrZalI+YQ:S7IMjsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 4704 msedge.exe 4704 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2236 4704 msedge.exe 83 PID 4704 wrote to memory of 2236 4704 msedge.exe 83 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 3636 4704 msedge.exe 84 PID 4704 wrote to memory of 5052 4704 msedge.exe 85 PID 4704 wrote to memory of 5052 4704 msedge.exe 85 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86 PID 4704 wrote to memory of 4700 4704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61a646f8,0x7ffb61a64708,0x7ffb61a647182⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9698942499849917765,9747275551861934228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD59d343da3c103d5b7769bfe9dc6c1b942
SHA1b0301c1f06ab59a386c6bf1188358a559f82eacb
SHA256f9541df123f15e32839d112bf0425d15f873adab3a904fc03a348f201920ab44
SHA51229f6d290454f28ed8e2bdd0331dcb335ebbac6a11ccd38978e33d8ff4aba8c27f446dd075da1e0741c3689771c94d764756e995a5a02caaf389194e5855500de
-
Filesize
6KB
MD526b155cb6d538c638fab53260d350800
SHA101d7899e9c33b75b1a87ab74bd46370e18fa284c
SHA25668021f7453f390fc62d9d078db41b29f7f2fa0bb9c3578ade523afd84b58431e
SHA512e7ed17014b3c17f0d6da4ddced72686ef91fec55e9bdf3f460c9eef35cf77f69ffaf7d0f1e21aa45e3a291648c923662686bc6e39c88a303cd6929bfa594789e
-
Filesize
10KB
MD5a0c8f6576680815f919b2b1ed58b136d
SHA1f3db294619e3e00e136618bc0c7e795e16bb435a
SHA2561b2bdf505f989ad1ac7420b4ce5e885069d55bebb7cf53d6ceddd43c98e60708
SHA5126ddb0fddc190836982c19471b9446d3b662dbf1ddcd745cafd5635a4e2fdb593dcd005686137774dec0623ab2977cb5c31a6daebf12b81cc7339f600ed22f0ea