Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
289s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/10/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas-1.html
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas-2.html
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas-3.html
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas-4.html
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas-5.html
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
OEBPS/Prov9789132163562Pojkenirandigpyjamas.html
Resource
win11-20240802-en
General
-
Target
OEBPS/Prov9789132163562Pojkenirandigpyjamas-4.html
-
Size
891B
-
MD5
f48ee8ab94c94767046373756813e210
-
SHA1
00878adf33d4368ac94f719e65a5885562d30980
-
SHA256
0309dd25ea182bcff850266ecb5a49bf4cb8c5386b4580d37fdf32190f0288f7
-
SHA512
84ab233cd0e36e311b36193b563443a4608258212a600fd0b73666c5843f3f6e5312f3abf3d381089735e5274d18623069bb73e4d45ccc886900e63f421d83a9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 4148 msedge.exe 4148 msedge.exe 4424 msedge.exe 4424 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3740 4148 msedge.exe 78 PID 4148 wrote to memory of 3740 4148 msedge.exe 78 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 3532 4148 msedge.exe 79 PID 4148 wrote to memory of 1484 4148 msedge.exe 80 PID 4148 wrote to memory of 1484 4148 msedge.exe 80 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81 PID 4148 wrote to memory of 1568 4148 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\OEBPS\Prov9789132163562Pojkenirandigpyjamas-4.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4ba23cb8,0x7ffb4ba23cc8,0x7ffb4ba23cd82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1244685512741633681,8700582246976212453,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5302c3de891ef3a75b81a269db4e1cf22
SHA15401eb5166da78256771e8e0281ca2d1f471c76f
SHA2561d1640e5755779c90676290853d2e3ca948f57cf5fb1df4b786e277a97757f58
SHA512da18e7d40376fd13255f3f67a004c3a7f408466bd7ce92e36a4d0c20441279fe4b1b6e0874ab74c494663fb97bd7992b5e7c264b3fc434c1e981326595263d33
-
Filesize
152B
MD5c9efc5ba989271670c86d3d3dd581b39
SHA13ad714bcf6bac85e368b8ba379540698d038084f
SHA256c2e16990b0f6f23efdcecd99044993a4c2b8ba87bd542dd8f6256d69e24b93b3
SHA512c1bc0dc70ab827b54feb64ad069d21e1c3c28d57d126b08314a9670437881d77dba02b5cca57ef0f2aa7f8e7d4d163fbd2c6f246ea2d51ce201d61a89015e8b7
-
Filesize
5KB
MD5036435d7b828d9ab864ceb7d2196281d
SHA10599fada7334b64595c55a8dc3038d25b37c2bbd
SHA25631e3bae49550fd40fbaeefdf1f048861467e5403d090f96d1d5c682aeffb859d
SHA512ce69f5b9b4f02096efb5f7739581db800e4449e3b91a788bcef596f8804eca9029e562adac6fbe3783c8ac81f3246e727ce36d7ae283b0317d970c7b6a79be48
-
Filesize
5KB
MD584c287dba4358f0353a98ece083d73ef
SHA19d9cdcd6da1a87b2f2a9446a147ddbd1d1aef50f
SHA256b4741ad1fbfcee677d9a1ec59e90f11f929715eef6d35f10c3df690e70bcfb90
SHA512b81aa9e00c6ce1e1777a78ec9d8c7fd6a4553cc0840597027f25d8a0cdd4264978107475396a90aba1392d1e3012f24cbea838252c4f464cc6eb31195db56fbf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0a04b27a05b02319bdc2a50c09b643c
SHA122322ddc87d7092e04ecaab037393e61e08a949f
SHA256e67d96b4f1a18140f655e5621e1d52c68d7bcf42fddf7fb4b30d61925a3c6c6f
SHA512aa98c40f258c4f5f4d61a8c06c6db4203b1e1a2f8b13c716fbbfa99134e2953c028bd1640788ea79585f8155b4c0b4a37bba36e7f679dd9b38eebf236eb1a162