Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
33992f38be014ba3c5d66fafefdd4f27
-
SHA1
67ba164403d865cca2f5f9fce2bec9f955b4d866
-
SHA256
d656ee7cef0e10b0c501ca44a72a53e084370f873d08a79865098cf7c46566d6
-
SHA512
8e1958844748dd40f1e883b5ef7c398fd93583e1568836393575abb5cd2641cbc2fbabdb6932e45c446eec33edcc0e0b2ddfa551b9391f406b05ac29eaf34817
-
SSDEEP
3072:SN3y9IpVBOjryfkMY+BES09JXAnyrZalI+YQ:SldUOsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2252 1104 msedge.exe 82 PID 1104 wrote to memory of 2252 1104 msedge.exe 82 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1332 1104 msedge.exe 83 PID 1104 wrote to memory of 1612 1104 msedge.exe 84 PID 1104 wrote to memory of 1612 1104 msedge.exe 84 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85 PID 1104 wrote to memory of 3472 1104 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16175442919094382196,7927744894715317592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD50525930e660ae98d67056c2ff95e64a1
SHA1b1ea3ccbd98141a81b0891473c9a51501267ff35
SHA256ff6231067247be23f7648c38d84eb1342a241229821154a60315b9ef8ef568ee
SHA5126180fe01557df0609920ac59bfd97dc1cbf1d5be5baf3900953c38e673e57b97adbb34b50bf356391f5c656bc4c2b737708d00fa5a1f4f6cc3d91c61e6569726
-
Filesize
6KB
MD5640af92ecb152268720316476a161f2f
SHA1009d956e4b3405c28b6c639a069b50acfdbfd995
SHA256aa43f4c37987d7724313a0b82046b7d8e0ea870068879adbe238e20ff53f12d1
SHA512201d3f0ca3ee388a963c56b057ee2399ca25f18b791f0dd92e4b53387d4902dd0a51592ace7fc42bd6dcccc333c82b524b0cf6e88d3cf4742157f395fd87be7a
-
Filesize
10KB
MD55312caf1102070b8495fa39d9e030c01
SHA1b69369f9e4d725d288826a757bc1a6a4a1dd481e
SHA2564a99023e875f0a44d63c4c5be494144d5126016f89d60c708392e443ba1e7722
SHA512086426d6dce6096f39f3d612b76a277bd690faa864bc1d5623befbf99c4466ce7bb19399883449b4216ab09b158dcd4ff32bfc9f3f7f554c1c814258f5272aa2