Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/12/2024, 20:18
241205-y3mm3szpcx 305/12/2024, 12:32
241205-pqsh5avkc1 305/12/2024, 12:24
241205-pk96zstrft 10Analysis
-
max time kernel
12s -
max time network
14s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/12/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
registry.html
Resource
win10ltsc2021-20241023-en
General
-
Target
registry.html
-
Size
1KB
-
MD5
689a1880d6c5c0af7d0e3e567fe3df23
-
SHA1
0e6f59da774e68d9aa8e18ae06865c473a721900
-
SHA256
3e2e9b64c2701ed6fdd503b5cd52dcda17909a3f9f5f0f6c6b42ef8c9ae23c95
-
SHA512
2ea34967d9a2c2478734537731fda96017e97fef4fd8ede1ec025e4fef992ca99fb8c412b15569edd697d451f26c6bce589783e0393dfe9538c158a7f1207160
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3120 2460 msedge.exe 83 PID 2460 wrote to memory of 3120 2460 msedge.exe 83 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 5064 2460 msedge.exe 84 PID 2460 wrote to memory of 4960 2460 msedge.exe 85 PID 2460 wrote to memory of 4960 2460 msedge.exe 85 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86 PID 2460 wrote to memory of 4944 2460 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\registry.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7fff6fe746f8,0x7fff6fe74708,0x7fff6fe747182⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,15229021944856574061,15396319889050287922,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,15229021944856574061,15396319889050287922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,15229021944856574061,15396319889050287922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,15229021944856574061,15396319889050287922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,15229021944856574061,15396319889050287922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dda6e078b56bc17505e368f3e845302
SHA145fbd981fbbd4f961bf72f0ac76308fc18306cba
SHA256591bf3493eb620a3851c0cd65bff79758a09c61e9a22ea113fa0480404a38b15
SHA5129e460013fd043cee9bdbcdaf96ac2f7e21a08e88ddb754dddbd8378ee2288d50271e66b42092d84a12e726469465185be11a6fafab6ed4236a244524bd60f502
-
Filesize
152B
MD5f6126b3cef466f7479c4f176528a9348
SHA187855913d0bfe2c4559dd3acb243d05c6d7e4908
SHA256588138bf57e937e1dec203a5073c3edb1e921c066779e893342e79e3d160e0b4
SHA512ef622b26c8cee1f767def355b2d7bffb2b28e7a653c09b7e2d33f6468a453fff39fd120cacbffd79ce35722592af0f3fb7d5054e2dca06310e44dc460533f3d8
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
5KB
MD54099a12bfb2cb7824ff164cc1c9f1fd8
SHA19a114ec2c91da80b688bf7de4434e21a29329687
SHA256a54fad3e02415abe121ce7b8fbbbe1b91be2717a4ed33013644cbbe14705596a
SHA5129d8590278fe188a102e04b7c45f2d993a92daaa6f07d8c4a64ee1c5dc998a837c6c069f1eb93b8632ff99eda57fd725dfeb3a2b445439c49e07d41bc78bf0a44
-
Filesize
5KB
MD50de2eadbf8e830c6b5a0f85d6fb3a44d
SHA1c3a337e54c9241386855cdefb409ac13d86a3f7d
SHA2569bb8ce1c200b4a2145a11d731213639dec00cb3f5f137031e099752945f7e63e
SHA512c98712aa89764f158621d364b2b9861e96109f5209cd5709968e646a06b340987b4382366c97b96c0e34c9d98eae186372e91b40a3307a95c3246b5ee0618972
-
Filesize
24KB
MD590cc75707c7f427e9bbc8e0553500b46
SHA19034bdd7e7259406811ec8b5b7ce77317b6a2b7e
SHA256f5d76f8630779de1fe82f8802d6d144861e3487171e4b32e3f8fffd2a57725fb
SHA5127ad692bce11aee08bf65bb7c578b89a4a3024211ee1deaf671c925d65cc016943f2caad3d57b365e16d1764c78c36cae35c3c45cef0928dd611a565b0313e511
-
Filesize
24KB
MD50d8c8c98295f59eade1d8c5b0527a5c2
SHA1038269c6a2c432c6ecb5b236d08804502e29cde0
SHA2569148e2a2ba2a3b765c088dc8a1bdcc9b07b129e5e48729a61ebc321cb7b8b721
SHA512885a734a97a6f8c4a8fb5f0efa9fe55742f0685210472ed376466e67f928e82ddf91ba1211389d9c55dd1e03dc064aa7a81d1fca3cf429fbaf8f60db8b1348c6
-
Filesize
8KB
MD59b6ba10d86a7b3dd14a2e5222927371c
SHA12a003e278ce8915ddc1a1cf6907a7726fe0399f8
SHA25698cc5168fd372f1f79f85ee94bc94c6dc4cc93775d438782d00d6f538b293e5b
SHA5128b6d872e70dbeec3a51660bf49a97116bed48b45bf41a037f8bf361e7c6cd4cafca5363f8e34441cf08bbd0d362a763398b5f70b8b93644fe95fc0fa8159ded2