Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
f7ee4220e99ab0c775d8a4b749753d83_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7ee4220e99ab0c775d8a4b749753d83_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7ee4220e99ab0c775d8a4b749753d83_JaffaCakes118.html
-
Size
79KB
-
MD5
f7ee4220e99ab0c775d8a4b749753d83
-
SHA1
bdb513219257475b4b9cfab0d10c6945e678de99
-
SHA256
e533fd5344f243ec0b128e28024e00b50865d18d25118cd2d3e5b20c0be66872
-
SHA512
7dd270b826ea339c890e3f3a3ec1569b13330eec4492de3245438bcf0d226e0b4bc107c0ad6aaa54b376468189899243545e5b6c187c272650385f4544345e4d
-
SSDEEP
768:OYDqSmN5RVWQ2RloLwofuhPAK4KYMi1VYTaHrm7LH0vkZxh:OY2JNpWNRlbvIVoWrm7LH0v+xh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 2284 msedge.exe 2284 msedge.exe 948 identity_helper.exe 948 identity_helper.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1232 2284 msedge.exe 87 PID 2284 wrote to memory of 1232 2284 msedge.exe 87 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 2968 2284 msedge.exe 88 PID 2284 wrote to memory of 4476 2284 msedge.exe 89 PID 2284 wrote to memory of 4476 2284 msedge.exe 89 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90 PID 2284 wrote to memory of 2520 2284 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7ee4220e99ab0c775d8a4b749753d83_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5b1b46f8,0x7fff5b1b4708,0x7fff5b1b47182⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17528804259575982576,7071668114653938177,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
474B
MD59587ce447c856445e72cde8d96b6c85b
SHA1dbfb11d7269a23293b116474cf9792bc6e2f21a5
SHA25672536f6d2e4ada0e4329448327cdb6b7fecf6192cb8976b6998785cda03915e0
SHA5123b56480a7a4f52c1bc0e109de1d0ee2677e626424194883136778a511b6a3bab2ec86b047fffb1d80c870c3eb76046f3f2cab4957e27d8dab18aa68c38b2cab8
-
Filesize
6KB
MD5a1e9ca6ed3f1b8863cf388d913a660a0
SHA19f82cd3ea4a36f9ace8c1b50955238708924c3ad
SHA25685337d5e504b973c7e82c835ce27a5cf44b09ec7aeb84003f53d44786c1d88d8
SHA51252eaf7ed6f7912672322390a80fe0b97849cd6f84325237239a4b05a3d235daaabd976a649f518b93d6405f78619cd594710d4213fe502e9f3206f27242b4e1e
-
Filesize
6KB
MD511641aea0c251418b30084311734a5a2
SHA175a74fb43fe1b26d4c218f9f8598f9d1cb519051
SHA2569debe7888fe16676950db1e4acb87255bcfafe16a6bf37834475680f1e941d7d
SHA512a59af65babf91cbec236787026cd0a1832cabb58b90cbc5475967a614c3b9d4715c1725f0d7b97a0c6d35c6936a0a0d8e0e2ed2ecfb4aa67cb4a5cbe697289a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a16f59e540e7aa5cd8810a254dd51b69
SHA112fe7f6017362f6431a3b55bafa8e7a97eb78ea8
SHA2565ea4b507e56e99c866af25d10a9ad42901c66353847474a1fc1fa7cc7c574f61
SHA5128f88997d92e49d0dba224e76a1bcdef6201267029eb352c47587c41dd1a81c23c0f8ae08b0a4e35f85bf60efae5a715e5aafb2020195a96a9a9b0bd3db41e698