Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
052949f6f3b176316120f008bae6a514_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
052949f6f3b176316120f008bae6a514_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
052949f6f3b176316120f008bae6a514_JaffaCakes118.html
-
Size
14KB
-
MD5
052949f6f3b176316120f008bae6a514
-
SHA1
36232d3c80646d9def4b36b4833cae595751e902
-
SHA256
d3a32568b153bdec2cbb093c0fc955b6bd0741d55fa06d4b7c2fc6caa7c1b31b
-
SHA512
fca8df1f1adda98da9a754e8940d6d321728c7e2ecfc50a1e9168dc62004f66ac48e05057d46d6b584724d778fe4aa2bfbd1dc23502fa94cbd5b7075400d8d25
-
SSDEEP
384:CyiMnQd9/tU7yUnmFAi7zy1w0M/2CHttvzh3AqxMUSeevF:CyiMQdVeOAi7zI1M3X6F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 4564 msedge.exe 4564 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1840 4564 msedge.exe 84 PID 4564 wrote to memory of 1840 4564 msedge.exe 84 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 2064 4564 msedge.exe 85 PID 4564 wrote to memory of 3772 4564 msedge.exe 86 PID 4564 wrote to memory of 3772 4564 msedge.exe 86 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87 PID 4564 wrote to memory of 1524 4564 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\052949f6f3b176316120f008bae6a514_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8cff46f8,0x7ffd8cff4708,0x7ffd8cff47182⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,285614567913622884,3602238684712912981,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD552646013fb2f42fcec3b79ebfe829906
SHA114a95666993a22a174bf680a6dbc360bff6c6f3f
SHA2562c3a3559e24ed617ed855c5136a1df6ac398e05d783a982ccc17ec1bf5945e38
SHA512a28f84033030dbf0a4e0e5dee4314a9054582bbd54fec4ad5a31853b0c48ae5c25e35f21d1743590cb2c3d5a7736e3e395ca76aa21f5616a2df6648f2c72f9df
-
Filesize
6KB
MD5ef8d82ca21875a661f6810329332745b
SHA1bf35a781714d02b6546bcbc9bc04f69e249b17e9
SHA256c8060463fe872a4a9596b783ff0b4aae0dbd09508889c7f14aee4207869c268d
SHA512b5ba83c6e2829374312ff4c90b3bdbd244f001c6dae515b6eb02dbe3233f28c003c2c20ac1d2028fadb7191d7e5e83f2ad9c55a369a7caba80e634861efde008
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55c6eae58bb2dc17dfcb4e2d6c7a27eff
SHA1e63cde1d0cb96c74ea0890a5fd5e49e5a9ba6e93
SHA2564d54496c7b41b7da3e6f3af16d5d6ae8989fdf9dbd5ee75aa74f5ff211212b51
SHA512946e98debf4d2ce83a217a95825d66a696ef1a29c1ddd9734ccf1967f444e2872f63ec6f4bf9c79c43189f8eb55064cf192cd44128158d5ac996e642471e288d