Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
f5b2df6dfe906fac9365a7bac634ad24_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5b2df6dfe906fac9365a7bac634ad24_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f5b2df6dfe906fac9365a7bac634ad24_JaffaCakes118.html
-
Size
31KB
-
MD5
f5b2df6dfe906fac9365a7bac634ad24
-
SHA1
2608becb6491afe718d5f0b45a5f38606db0248d
-
SHA256
e8c0ad934ac22f4f89dce8e46c2bf98028ce018261b15b5a3ee2b6ebd12501eb
-
SHA512
abaa2e9adcf10b1d79dcaffcb1997630eac3b604b797ec41729655011beb67ddf466bc5d9dd9c01b2a768df532a85dca1176bf9b18e001161d100b5e8b9c11bf
-
SSDEEP
384:DZUZG0wuEXO+TGBvOiKX2cAkeIi4ymxhmhcbc5Kkw29M:tUZG0wO+6WiKzqIi4ymxOpY9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 1616 msedge.exe 1616 msedge.exe 4048 identity_helper.exe 4048 identity_helper.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 228 1616 msedge.exe 85 PID 1616 wrote to memory of 228 1616 msedge.exe 85 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 5088 1616 msedge.exe 86 PID 1616 wrote to memory of 3460 1616 msedge.exe 87 PID 1616 wrote to memory of 3460 1616 msedge.exe 87 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88 PID 1616 wrote to memory of 2292 1616 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f5b2df6dfe906fac9365a7bac634ad24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa1bb46f8,0x7ffaa1bb4708,0x7ffaa1bb47182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9262980697218340764,604705134767932971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
6KB
MD5bde242248b037737496103e69a2f839a
SHA162021b1eed020e8dad8845127d02b3a4f98029e4
SHA256d2ef0ca370361ca5f68b673e8f22ca59440b949d6591ca6b88c88fc17ad81861
SHA5125a585e5dee9cafa7d06a4ee058a2da2f3ed7d857801826f6e1639f7fd78f2e602c7897d59b3c950d2a58e3bf8f138f4bdb0b5d4adcf802402905b24103bc8f7d
-
Filesize
6KB
MD54424c6ac8204909688e79ca4bc3cbb02
SHA10d26886b9dfedf62546c5783cd9ae55cef0fe3da
SHA2561b55c6e22b56fd584f035539ca63c7714c3924aace1191ecf06f1d088b7b2cc6
SHA512a04b8744d97ba022ce8ad831e6f411f00f6bdac2503298f7b66cd6cf0f03474f777618758ad6f9d9a8377aacb90c7354f83438ca80982e836f67ce6b31f43832
-
Filesize
6KB
MD58bc8b4e4862ff051f75568091bcfe0ab
SHA12bbc765966214de89e92d5d0af601f69332fe6b1
SHA256f459fc2010c58c951db8ca439968a5187b10ee73879a0ec3d3e1afaa0be7a4f4
SHA5128ba3ae97606a0c2e6590115aa62cc8f098f258e9c53958ebc7b4658ee32cadc8c55aba2e35bde2225d2e9769bd3f218f8f535da2c8142ab68bd99b112f3f322f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ddfe82679e0eaa7ce60c0247231664f0
SHA110dcfb9ed9e97da9a8784972d6d0856f1654ada3
SHA256673e668595a10210af08d4c5d75f05759bbfeb3d09d2932ee3fcd6fdc580adb1
SHA51230f6a4f26c3e286da1d7294c4783cce1529095096470e8e281e83f8c5758770d8b0d2bccae933982ca7acf189d40dc9bdf3ae8ff237836480fa5a1f8ee1f3058