Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
f7fdddc57da4c86e8d59d2eced67da30_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7fdddc57da4c86e8d59d2eced67da30_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7fdddc57da4c86e8d59d2eced67da30_JaffaCakes118.html
-
Size
32KB
-
MD5
f7fdddc57da4c86e8d59d2eced67da30
-
SHA1
ed5173f3a2f9237be162f9e404b15029453677b3
-
SHA256
eb168bbc4c5dfbd182aa5dc2a8a09758851bc4a8dc405c105b05ec3af9fcdaba
-
SHA512
23527f57548aad83f18540d89f86e03156ac0a22a8ae8ce4c6afadd189fac58a48a3d0aeb283a2d54b5daa04891d985cb0f282e59c68ba5538a4a786e52661b9
-
SSDEEP
384:SIlnBMYyjauqtD9sUArbeXBuvIyLyQk0aBUynom1zMRPIoVUqp:SIhs6BHyVkFBJolRfVUU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 4412 msedge.exe 4412 msedge.exe 2180 identity_helper.exe 2180 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4644 4412 msedge.exe 83 PID 4412 wrote to memory of 4644 4412 msedge.exe 83 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 2784 4412 msedge.exe 84 PID 4412 wrote to memory of 5004 4412 msedge.exe 85 PID 4412 wrote to memory of 5004 4412 msedge.exe 85 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86 PID 4412 wrote to memory of 4820 4412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7fdddc57da4c86e8d59d2eced67da30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa069e46f8,0x7ffa069e4708,0x7ffa069e47182⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9813707095573609931,1006374613201860100,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b1931878d6b8b22142fd7fd614add5c
SHA10e20ec0bec5a9fe3b6666c3009626f0420415bc7
SHA256d78e49cf9c940d8a407fca2338e30b754e4579c64e88932c46c3871f62c15904
SHA5121e7a63ff7340719736560277601ff43f30937dbd4a1fbacbcb0d72fa708216692a4bb4ba658edf227b767975b430fc94e7c4f0b5dab29bef9483bfcfb38e1cf3
-
Filesize
152B
MD570ae4bf8f75c69610c1d00131c1ec28c
SHA1eab92c184a3b655377f375b1b25ef85fb06c7130
SHA2569f46453862eb083e85697631455185c0ead19ec86c1ae3d15274c06c9a38731b
SHA51229299dbc0114f01525bff67ec421a28056905e8f5d21f00502554f446883b6086f8b9a2c27a591f364077da17c21438910b8dbf163a59f6f80272eb7d5f05c68
-
Filesize
266B
MD54b7e5e9e32f23076f0b77baf7ddf1be1
SHA1fbb09bac4111bb87fb5193acbac66bec05d63b3b
SHA256ad6abdc36b7977270f633e396d6028d40a5cffdf9b211a2bc1eb9efae553529e
SHA512bbcfa8e176291ab65a481290860206b746a199909c9a3931f4a2a1dd1e6a7c23b61a2fc5046de3b9c81d4d014305e3dc55acdcf5f1b88032d65b7709bb0bf1db
-
Filesize
6KB
MD5713d519b7fd16469d73d0a3e62ba507d
SHA191d44180e92cdced01fe9e7125d382eb60b36a65
SHA25621f3658d3375e19cf8cc12aa36bdd53cf04051bfdd38ad99842f7a659c08c060
SHA5129f40af5d83e180aabbb69e534a577a56818d4a6ff1a00bd0a36d6438c5b3a56a50a437998d4bd1a1635bbdc6aa772474d5e278ad8f2630932b3978e79ebd62eb
-
Filesize
6KB
MD5b89e2883e342572bc0c2be1e6b469ac8
SHA1fc23cf840bb0e73e36c7f885beb798a5710212d7
SHA25661c05665829fc33ee6a1d597fb673d39ac6d86c43fed1db672fb52ec50c1a9e1
SHA5122886c50b1a67e4d1a7f9414bfad9254bd2877834af17e6c0d8e165477e1dd4d22c98356e86194f2cb1d06d90fd80251c55d114b342bb7f4a13128e6936153697
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c154357da7c970c02711e9b86ab3fbe5
SHA19d46b7836d15e97da0c900875cb61e216d999804
SHA256e9d554590d02114fd50485a99a419cef773d8eca53653dd3689a340f6e485b8e
SHA512a47098a40bd181af8ec9965f40ecd79b5bda2eda5c6f5b51719dba60472024b4751915370af03da5d7947426cd8e73a8d76d715a571ab3f180ff7f0641784d42