Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
05952ce7b9498a3c1be2275b9d6c3e9d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
05952ce7b9498a3c1be2275b9d6c3e9d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05952ce7b9498a3c1be2275b9d6c3e9d_JaffaCakes118.html
-
Size
36KB
-
MD5
05952ce7b9498a3c1be2275b9d6c3e9d
-
SHA1
7304a3ddd5865f70d3182932355889ba32b9e74e
-
SHA256
a38a7ab626160de5f61f4d35bbe2154d54932174af2034ff4ac95a17855ac52f
-
SHA512
02a638aeeeac6f8725652a7a0c293a956c552bd504908a56a6095359de530efa1ccc2dfd3d8a5f0ef41f9c8fd35498d0ce7fc0dd5c8aecf65c7628158a686b36
-
SSDEEP
768:zwx/MDTHAa88hAR1ZPXUE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcV:Q//bJxNVuu0Sx/c8GK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3312 msedge.exe 3312 msedge.exe 3888 identity_helper.exe 3888 identity_helper.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4772 3312 msedge.exe 83 PID 3312 wrote to memory of 4772 3312 msedge.exe 83 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 4612 3312 msedge.exe 84 PID 3312 wrote to memory of 3716 3312 msedge.exe 85 PID 3312 wrote to memory of 3716 3312 msedge.exe 85 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86 PID 3312 wrote to memory of 2992 3312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\05952ce7b9498a3c1be2275b9d6c3e9d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdb7046f8,0x7fffdb704708,0x7fffdb7047182⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16373000065243789431,4207281193671681604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD522c52b3eaaa7a10f9236399177318681
SHA1b4d5acd39c008fd98f8ace2fbb0e9c0a4ab6a0d2
SHA256c2eaf3baa6a6b5194eaca394c41000a86fe22933935ed84a52f27c0ca1690c90
SHA512d166dc39ef06a2e8039c6f1ecb01b6eb9f02796ab08c2127e6908e4dfa784764c267efeb753ea594818d8de10c908b183522efc055db15f57ed73f7317765c11
-
Filesize
6KB
MD58fc54a2d8180c3e16370922753d4de9b
SHA1299c817ed77b1c6a4df95d529c6286463aa2a49d
SHA25695ce8b337d9d18c7515d9a6276d636add95189fb44cd048b0bc717c1a6e7306e
SHA512b7efd3c5532b26d2acab2fe6ba9e7629a4475aad40594d288f8f0f946a9d28927a99dbe6a632d53d4ad65d77d6a71791a55b2105397daf06675d8baf16246df9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5037667117fb8cd745bc8492571e56525
SHA1c2351f45043f1ca8deaa74c66b942d9db1863abb
SHA2564f1a93007d2c9d5abe2a00205e39ec148d3a9d68e51a33527ca334c696991662
SHA512156507229a12632b79c87a701e67b800451f744e5f16e95ff56a2d26296fe365bc9d891703781a2de671260ded8a376a475df0cac3d45c6c49493e80ee84ce83