Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1org/sponge...e.html
windows7-x64
3org/sponge...e.html
windows10-2004-x64
3org/sponge...e.html
windows7-x64
3org/sponge...e.html
windows10-2004-x64
3org/sponge...e.html
windows7-x64
3org/sponge...e.html
windows10-2004-x64
3org/sponge...e.html
windows7-x64
3org/sponge...e.html
windows10-2004-x64
3org/sponge...e.html
windows7-x64
3org/sponge...e.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 19:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
org/spongepowered/asm/lib/package.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
org/spongepowered/asm/lib/package.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
org/spongepowered/asm/lib/signature/package.html
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
org/spongepowered/asm/lib/signature/package.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
org/spongepowered/asm/lib/tree/analysis/package.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
org/spongepowered/asm/lib/tree/analysis/package.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
org/spongepowered/asm/lib/tree/package.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
org/spongepowered/asm/lib/tree/package.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
org/spongepowered/asm/lib/util/package.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
org/spongepowered/asm/lib/util/package.html
Resource
win10v2004-20240802-en
General
-
Target
org/spongepowered/asm/lib/package.html
-
Size
4KB
-
MD5
344936d98eb07ad17ae420bd029c45b7
-
SHA1
01efe06bf41ce3a75010b1ba83bb3e911037428d
-
SHA256
30710f07483b31d8ff3c244c48a5166d9d85c348ff75e33f598e81e6e6e086c5
-
SHA512
252d98bee736a2c9b62efc40d33a19dfc065460ff345f607f747ce44162668a5e8ff9b85858eff16692961d31c1a49d1a26cf72126b41842c125d7d40d770dc0
-
SSDEEP
96:PkyOrYJArYJJt333n0T2zpf3g03bwC4w3pgPB3hh:PkyOrsArsJt333A2zp/g03H48pMN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2672 msedge.exe 2672 msedge.exe 4752 identity_helper.exe 4752 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4016 2672 msedge.exe 85 PID 2672 wrote to memory of 4016 2672 msedge.exe 85 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 4196 2672 msedge.exe 86 PID 2672 wrote to memory of 2028 2672 msedge.exe 87 PID 2672 wrote to memory of 2028 2672 msedge.exe 87 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88 PID 2672 wrote to memory of 4620 2672 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\org\spongepowered\asm\lib\package.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa08a646f8,0x7ffa08a64708,0x7ffa08a647182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9562568413133363617,12618032559616771180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.143.123.92.in-addr.arpaIN PTRResponse240.143.123.92.in-addr.arpaIN PTRa92-123-143-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
240.143.123.92.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
456 B 7
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
30.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD514dfb4804d41159c1059c0432609d6f4
SHA1851e5de202144d024cdec1039c99b46c9c40492f
SHA2568380d66cfd3ebfa58423f547b7bf550db301f258e22fd7071e30ffb2620e2da0
SHA51266e9dbbfcdbb1eb25df66c382a59cbfd0241b833f345f486ca78593e73d753d7e8f9e6632ff373b86569a517728ef4d9c4a9576a7dadf40d6ad7aeacc0bd7ec7
-
Filesize
6KB
MD5ed3dea28402bdfb75821fbe8aff1bbdc
SHA1668f5b527e4a401d0617c1653451cf211cceb4d4
SHA256dd71503e05d5cf6c9594469b35dabb6406b8c0c63a35e80e07e832d4edb3e923
SHA5129cdf425f11046bf5bcbec21d996519651a4dc4bb794c6287640f992be1f63780419e127a6dd242ef01905a90a524f4fb1b7b41091d3fd48068a36022b114f063
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538532ad983a1b35352672033cbf5260c
SHA1bfbf92f16c6a2dc9381a0e0e5cc8121c77245661
SHA256a1120d97765955af695a968f6cb5f416a1945b4f5d6a9a6f4c9046f487e864b2
SHA5122a7a6c211241721098bc63f4130852f641269b23a66036d97f716875cfd669863a7cc5fdc78e160ea6b8d2e574c8347576bd266a5524ea3135f0e6c0b8300dc5