Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1788s -
max time network
1790s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/12/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win11-20241007-en
General
-
Target
sample.html
-
Size
267KB
-
MD5
79c71a1177718da362083128aeddd237
-
SHA1
1496d4219e4266d0c609c93595c47d55a3fe375d
-
SHA256
0d3640ab26280297ecd40c7807f0c420fe376e3d32b59052279eb13a8fc9a7c4
-
SHA512
801244cd6d4a407d8c886803f5668ce1aaefec59d9f8c13a6a95654db847154419c8debe688f79248f218015ae7941f32bb4a7fc8830f607c2207bdabf3078ec
-
SSDEEP
3072:Rm/iwlwEq6DxoZw1ImA2l/R/h4w0yYGO0wImgrAwtN+Tl/j6q:Rm/j7jDxoZ2ImvRn0xGiITK6q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 2384 msedge.exe 2384 msedge.exe 3268 msedge.exe 3268 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2968 2384 msedge.exe 77 PID 2384 wrote to memory of 2968 2384 msedge.exe 77 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 3368 2384 msedge.exe 78 PID 2384 wrote to memory of 1452 2384 msedge.exe 79 PID 2384 wrote to memory of 1452 2384 msedge.exe 79 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80 PID 2384 wrote to memory of 2216 2384 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4ed33cb8,0x7ffb4ed33cc8,0x7ffb4ed33cd82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,2773325350570615742,10175209188147394388,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
Filesize
1KB
MD5baa0f55399588e97f1e65101cdd38d45
SHA1272d80e9f1370b1653ea2054ca8ad37762763d1d
SHA256d928398395670c5eddfb00c3220e2c090948b475db9765a7234bbd474e9f2924
SHA51247d3a6d543d591d362107256144bd0e577c6c241997aa27215e2e0cfa4e71fff5a8aae766911969205027951f7b44e6bc8209ad53b4b4681811d0606af571251
-
Filesize
1KB
MD5078e03fd4bb940273eab163f34d39c01
SHA10e8a10bfc051508cd2cb971fc8637e498ef0e95c
SHA256b28953a37618c3a4bb09674df445009ff1e22d78de3cb8bdb0a94ed498415213
SHA512bfcd5bd561d872ba6b61fa82feedd569d6a632dd908d4f210ca3d4b7e7382036bffdb752ff25c9827dc69845d1d8d61228ee5a4a795cd17ff3d1b22eff33267b
-
Filesize
1KB
MD5a5fd842ca097035a8dc09499f822eae8
SHA172669f0e9d04a6a27e4bcbd079ccf0423f17b080
SHA256a239d65e079e6f4ff9b51b36151ca2f6f7bfe19f1f7c5aac1f591ff4458c9caa
SHA512b59f4aafe07e6819fb410d6ad882e64261e2ad709c69107f838b07da9eb0184e88d5bd099b5fb4039fc7d0709d807f4230a8278659c70e165bc19bafd82ab765
-
Filesize
1KB
MD5128cc51445b0eeef0b58ec45ad9761f7
SHA141ebd38f577d7a616899296cdc89b909925ae8f4
SHA256e68656661d47c51a15ce728498658f10185e0a6f1715578f68e85c39669c1fa4
SHA512aa76f1439f9a3e0804cfe10ff0099d4c800a1bd16534f08f3d2f8aa811b0ec2665ac573f6e202a168d24920e16995c608b387440985fb1037b42cdc076b60725
-
Filesize
1KB
MD5b59b49015ce1cad38481903bf323f977
SHA1ccdc44c494d30ba8efa205391ab39cf7bfdb4501
SHA25618e49c3419d76502b79c02758b914302877851b4a8d2d6160d156bd5bab8f312
SHA512a8ab69014ebd44c3a99b3d62ebce55297b7e7c8189925f0f47c093548f5f8bec8c5679b45a81a36b641cc149eae5cdf9d1b787b4b166ee529872a080df12290b
-
Filesize
1KB
MD5f9b9d526be2d71b2a8777ff7b17e66f1
SHA1bf7852408014436efa18df0d54d5ebc75b3c0255
SHA2566710fa046aab34961718c14ee8e604ed115e4dc2e1b1d8013d28e2230e7a99e5
SHA51224c20f6e4dee240a2d0eaa9fc859a33db6c4094389d1403e4c804079faa9990dbf53aad50872b8e14bf1187665aa5aac10379c28665575b7a7e4b6b9a58118f5
-
Filesize
1KB
MD572bcc0701bf37e6784db645217be4b9c
SHA1237e659cab85b84095a750cb84c492ff4f43a586
SHA256b05352eaed1c349f791eb8ad0d05980d787034db7360376cb1577b2f97196538
SHA512bd878ba7037184ee1d24dd268335ccebb9324981214899b312e980225be12b556c4bb54e79399c8ac7ed8f0134bc7d2d82ff87f8e353e95e887b20547e506aa8
-
Filesize
1KB
MD5d1853a6765ee50b37ef2c481f5424b25
SHA17b6f14a6e7ccbd6fd6443ceb9a5481caa329a305
SHA256b8fc7b17a2d41473bbedd774f292f37d4b7adf7e6c7a646781e1435d9c7e1a8f
SHA5127dfa146f2acd870cae72cb16b11d5a5b9f5a3fb0e5a919b08ece5eb27f72ebf36d738c46fd423a421c7422cc1c093d3e28b5e8a2653fa5ba5f7144b0d887d5b9
-
Filesize
1KB
MD5d3526189aec09d00fdb135ad540fed28
SHA1187f64d8058b67d2a19766b53e388e2ac69ff96d
SHA25685e16dc59229a3b7b43615a9ec3c3a1bc77b65f0a3a98c83a35167bb5acef2d8
SHA512fdce2ff840d289f0c1cdb1e145d97f579c69e5fd9cec4b2dd8fa79cc0e6e4647a42d36e2dbef402cd9f05d44a7a863d621948fe4e8a40c0956f06c31df6c97f3
-
Filesize
6KB
MD55f90dd022b8d34efaf46dea2431b6544
SHA1ae0a50fb858e867fffe80209d8f167296f8895b6
SHA25648283055820f5906c8a511f8394843bb18a9918a12f1433d1ad8e0329f7ba0f0
SHA5123fcce4fad9d40bc926d667e439d2a6bf7792ec3a7dd478556667ed6c53f47f2e91903523f3cda904981a158a3359fa991cac5ec39e14a240ff86ec84429a1696
-
Filesize
5KB
MD5da6726ecec471125b42b09176d4fdaa0
SHA199182695ff929791fc10c7a8c1014111b5fd8346
SHA25623cc8a2c35f6d85a9702fb2c02df9890d1622dfc2eb4d5092558baa0f6ad725a
SHA512724824423a219dbc573ce1067d34bcba29c6d4b05076da99eac634f5b5d53c729494f6eabe83dad554c457ae3d9d8b71df59e3df9b6d08d327fc9eb21008ce9a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53571f69603878d29f0d146acf9b38084
SHA1f7b41184e1f4feb60f9bfdb33f065b37a6ba76d5
SHA256d05ff3939f8d283b649f57f1d88deb2b3030cb61fb9e12bb8bdc1c2f2f65cb22
SHA51298d4db987d46f5aa341bff3ad3099b1ebd717c150bea04447173361078a5f699dfaf72e045baa6a51d04f6e6bd0d1eef79f69c31cbf280763e2a024aa73f721a