Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 19:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
e4c4aef3207af2cddab4fc9a5b813565
-
SHA1
acb94744bbb6e71f2032471490171c7fed7ab5f1
-
SHA256
b3c651b77af9afc6e065eed6b5e3ebb008a62e29b322871b1e9e5ce5451e9788
-
SHA512
173aba47b5d50b270e542e3497f15d9bb7af02999b1e96bf2a0a627018d60a9faf972f0cff4f33bd0b5b9394ba80d409a97ec7eff3deb9348b85ebf4a36894d9
-
SSDEEP
3072:SGAx2/D5IM2/yfkMY+BES09JXAnyrZalI+YQ:SHx4D5iKsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 2180 msedge.exe 2180 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 5100 2180 msedge.exe 83 PID 2180 wrote to memory of 5100 2180 msedge.exe 83 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 4808 2180 msedge.exe 84 PID 2180 wrote to memory of 1936 2180 msedge.exe 85 PID 2180 wrote to memory of 1936 2180 msedge.exe 85 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86 PID 2180 wrote to memory of 712 2180 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92ff946f8,0x7ff92ff94708,0x7ff92ff947182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16627449450804370617,10019519402063760365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2s8.nqytc.cnIN AResponse
-
Remote address:8.8.8.8:53Requestpush.zhanzhang.baidu.comIN AResponsepush.zhanzhang.baidu.comIN CNAMEshare.jomodns.comshare.jomodns.comIN CNAMEshare.n.shifen.comshare.n.shifen.comIN A182.61.244.229share.n.shifen.comIN A39.156.68.163share.n.shifen.comIN A14.215.182.161share.n.shifen.comIN A182.61.201.94share.n.shifen.comIN A182.61.201.93share.n.shifen.comIN A112.34.113.148share.n.shifen.comIN A163.177.17.97share.n.shifen.comIN A180.101.212.103
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
52 B 1
-
52 B 1
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
58 B 111 B 1 1
DNS Request
2s8.nqytc.cn
-
70 B 255 B 1 1
DNS Request
push.zhanzhang.baidu.com
DNS Response
182.61.244.22939.156.68.16314.215.182.161182.61.201.94182.61.201.93112.34.113.148163.177.17.97180.101.212.103
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
303 B 5
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
45.56.20.217.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD53da85af1e3996e72c5d0690ca5e268df
SHA156f343a000327484fd9879635201e75985d22508
SHA25684294659df453de1e3725c88aeb6150b5cef287e34a2da1ab699f7d8d0d696d7
SHA512a22423792d9c1afcf1f815fd65fb7572c23ee4fb1bd81c3c94f0461fc2a4618c2adf23f2ae08549cad48949a0e5ace351eb75bc7823dd0129e313d7bcc09ef3b
-
Filesize
6KB
MD51b4ddfc2ce6d05f39e92f12a5fb5a248
SHA11bd92dcad62ab013f0c40da440a03672b114af71
SHA2565ce189c3ce52fb07bb1d76bc49bb3339ade02d2c8103c69dbc97fc8d0e6b76e1
SHA5120c9fd0f157a64d2115580637424e3a17c79bc223e4b9b2105e92bcaa77d32d7edcf0719b002cb1e486aa535341211614da78166d18e321b540cb28c390c238ff
-
Filesize
10KB
MD5664b34435e74363ed3a0afffa9124f04
SHA18283631b53565b200fb9ae76c865e3e04ae342f1
SHA2568532ecbd34fe4ca580b872e8447a3cb22310c8bce484cc6e46fcba49dbcd0e4f
SHA5128235316a1b50a81011a2da31e866250f2763c8077242da41a2960329022207628d8d3a0ea0b7db2e81de69d4a9eefefea1db543661f0acaba2575d005fee9cb1