Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
blocked (3).html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
blocked (3).html
Resource
win10v2004-20240802-en
General
-
Target
blocked (3).html
-
Size
462B
-
MD5
80641b398a9667a8e3d00a9cecab9c68
-
SHA1
d070b1004045c92afd4f132af58a9a3526c2129c
-
SHA256
93f0ab4deebcee5b48118d3bb9c292054ba7abefb03853de92b4339e1b133080
-
SHA512
0f5d7c4be63e3daa3f9000e8bff37c90468dc5c8b2c55bcdfd13204db575641452526c2687a6d3f2652498edd0b1031483a613c5078c4566aeadeaf9b71dabe2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 2624 msedge.exe 2624 msedge.exe 1968 identity_helper.exe 1968 identity_helper.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3392 2624 msedge.exe 83 PID 2624 wrote to memory of 3392 2624 msedge.exe 83 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 2952 2624 msedge.exe 84 PID 2624 wrote to memory of 4684 2624 msedge.exe 85 PID 2624 wrote to memory of 4684 2624 msedge.exe 85 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86 PID 2624 wrote to memory of 4088 2624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\blocked (3).html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c8c046f8,0x7ff9c8c04708,0x7ff9c8c047182⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7650124365789838290,15569225255710556315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
5KB
MD51b1d410ed3a98b3888dd83df28cdf1ed
SHA13e26dd98fb7cb029b1058da999b2986f40006871
SHA2564a210f92dbdd5179457c6a93aeb172edb31818972f0071a9a2fc4086709e4514
SHA512bf645825799596608a5555f4e79c6c99371ae10f4c834816330b1fd0e63ed2ab76b8deee42f4fe72cba629d12fab7b9dd6815219c5c05897ecab1099b188cfb6
-
Filesize
6KB
MD576500a9013ae75a5d0a71ee4425dd248
SHA1bddced291236e9c1f5174ee85fa39ec0077c51ba
SHA256488e0614e42c16642e8fc282e331b1a711aaa4c18fb697a83ea1c78369ffa676
SHA512181ac12752c5fc141b04cc9052c3571884c3a2dc2ad401c3f49a73f724440d8e6143736fb6191fe1c40d52cf7f6c284378cbafac06a96eb58bb0a8c6e3fabb28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55b1c92698c8bfa36aab6c650976df4e3
SHA164a905f4dceede4b670d78dd29672fe527148a68
SHA256aeb0411928e28d21c7830cc29ca43527f2ed18ef2ee75d385fac275d1c0afdff
SHA5120a18b241c71263aa6db2787a80f0a00fbfb0c42f0dfad7fd0e90d8564b6eda87d187804a9413c547f77ba35621494199ed3f812ac2d2d5687c1ca88f822c928e