Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Uw Factuur...df.exe
windows7-x64
10Uw Factuur...df.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3403-16.htm
windows7-x64
3403-16.htm
windows10-2004-x64
3403-18.htm
windows7-x64
3403-18.htm
windows10-2004-x64
3404.htm
windows7-x64
3404.htm
windows10-2004-x64
3Linker.dll
windows7-x64
3Linker.dll
windows10-2004-x64
3Warn If RGB.js
windows7-x64
3Warn If RGB.js
windows10-2004-x64
3asyncqueue.js
windows7-x64
3asyncqueue.js
windows10-2004-x64
3compare-wi...cks.js
windows7-x64
3compare-wi...cks.js
windows10-2004-x64
3head.js
windows7-x64
3head.js
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
Uw Factuur 0092-0287492-39238.pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Uw Factuur 0092-0287492-39238.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
403-16.htm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
403-16.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
403-18.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
403-18.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
404.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
404.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Linker.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Linker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Warn If RGB.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Warn If RGB.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
asyncqueue.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
asyncqueue.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
compare-with-callbacks.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
compare-with-callbacks.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
head.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
head.js
Resource
win10v2004-20241007-en
General
-
Target
404.htm
-
Size
1KB
-
MD5
c9bc5da6fd95dd59b3d1e69c3bc97d40
-
SHA1
ff4b92b0c8d12a77d12853be583c85fad9b4ebd7
-
SHA256
cd201762f1c25dc56952abcb7d09a2463aca29a67872ea1cf732ca244a66867e
-
SHA512
2677a2cf9f066afb73f2cade9840655c9e592273d2870b74bd1d28f9a899e10a47d127871f9b7f0e817e7bfb93ace30bb62c90a66001eed6ca75bbe29682d156
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 1448 msedge.exe 1448 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2436 1448 msedge.exe 84 PID 1448 wrote to memory of 2436 1448 msedge.exe 84 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 4512 1448 msedge.exe 85 PID 1448 wrote to memory of 2256 1448 msedge.exe 86 PID 1448 wrote to memory of 2256 1448 msedge.exe 86 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87 PID 1448 wrote to memory of 4860 1448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\404.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b00e46f8,0x7ff9b00e4708,0x7ff9b00e47182⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14919053111068395357,17586995694501431220,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
5KB
MD54151a469c1dd3b3edd5ec8a907bee0b1
SHA15aa34607e8f19a5a83116ba36fa23f94ba4675b6
SHA256a5e12008f20150a416e2c49838cffa50a339a1e5092d6aec7e74819db01d5740
SHA5127af42c0fcb4bf6d6f6eccf6090c983e9b9d0a14932579ddda0ded3de28ef87fd489ab725851365e5cf9d5fbb548de9418d97b60ba52b68187c2b74d0b9a13734
-
Filesize
6KB
MD574481ce8b48cf1f6ee234af0206af5ad
SHA1491c3b9b8e022bf8ff68f27f88633968874fc931
SHA256d66b4ec2d765c8c607bc0d66d5d40920772e80c2f37f5fc1ac58ab3876e1b663
SHA512b751474b5400e6e23cddddce83a1751cb21d9dae0e262c33d6694208cbe9a987f086cfa253825ec3ea4b833802e22ec692038e1123441165bc90a906b950293e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50f3324d28dc40dfe8aecd36bb9296510
SHA1b2a60567649bd7e3bad3289bd9649675f8f11e67
SHA2569afd136fbf6c5bb418f222b2e5b2862284f167cd8f21359a369d476e8671ef4c
SHA512cfda59289376fee89affb14633452c45b391b0143319d97e24d72339b756d4fb97ec29b0e03ee2ec0aa265058971f879777ba2c1a5e02ae4377b0f1a31043311