Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
fc67d8c2e8f1846f693afd9a6d850ef8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc67d8c2e8f1846f693afd9a6d850ef8_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fc67d8c2e8f1846f693afd9a6d850ef8_JaffaCakes118.html
-
Size
7KB
-
MD5
fc67d8c2e8f1846f693afd9a6d850ef8
-
SHA1
40a5146e2494ad2089983670799115d3e1ca0700
-
SHA256
e84c7ff73ba0046883afba830d2c7cd2a04cb8031f55b80f7d3db1f98a976eb3
-
SHA512
1652be4292a098024e39bba721a9f4fd8d76c429f0586efefc5a217687618ab479eb48574f98629fb1aefdb24911e840e19fd6f7e317ca6d8ae113ae1046e0cb
-
SSDEEP
96:uzVs+ux7n0fLLY1k9o84d12ef7CSTUGzfNhFBqIYP+YcCcEZ7ru7f:csz7n0fAYS/Nwr9zb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 4688 msedge.exe 4688 msedge.exe 5028 identity_helper.exe 5028 identity_helper.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4916 4688 msedge.exe 87 PID 4688 wrote to memory of 4916 4688 msedge.exe 87 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1800 4688 msedge.exe 88 PID 4688 wrote to memory of 1228 4688 msedge.exe 89 PID 4688 wrote to memory of 1228 4688 msedge.exe 89 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90 PID 4688 wrote to memory of 2488 4688 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc67d8c2e8f1846f693afd9a6d850ef8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6afc46f8,0x7ffb6afc4708,0x7ffb6afc47182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13637316816880637432,5640304600355587655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD57b25e95d4011c7601d5ab834feb5cb0c
SHA13dd6a1eac8abf620dcfef67554bd72e80991db35
SHA256b810bf1fdd0febe60d9265badaf4ce04d819392fcd71e36ede6be8cf6ffaff0a
SHA512db8fadb2a8bb4cb1863547038c0382478109085ae479a79a8393f9aaa10035bb6bce03a522aa598d84ad2eba33114ccafc8bacbf912b5a3c16f8695814386937
-
Filesize
6KB
MD533aba735264c4a98a4cca3ad8940af28
SHA1c617b492618f9d80ae0574000fb204135ebe657d
SHA2564427dcfc33f85be36258ec873f314ace5c0926528a73ce5feb1a7879a1875f1c
SHA5127e6080da996daffc76cc2a26614a0f43dae57e5c4884bc2903a2dccc3ebe85b2ca6bc5f00985c1f59c311ec2fe51f0bf4109d5c31efdb213124d26edb37b96d5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5193c2bb14f9442385b73b50e1c8f2eb2
SHA11f1aa95a1dccdf8fa0c9868812f8c9593eb26cf0
SHA2562caa5eadb06db5e1a00f097dfdff93b599e7788e413cd28a85f1719d8e2f4760
SHA51251c0fb2356c52c799691517c8c638d94c54048c76f1ad318fecfec8b5cccec100ec79a6e01b9456fe42400ad5e8545b07dc0815fde03e13f8acc61daf20ea5d7