Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
14f60c37f229cbec8724046df5b9a0d8_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14f60c37f229cbec8724046df5b9a0d8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14f60c37f229cbec8724046df5b9a0d8_JaffaCakes118.html
-
Size
35KB
-
MD5
14f60c37f229cbec8724046df5b9a0d8
-
SHA1
b67a0823dccba065541d3759130b16b2201bdf8b
-
SHA256
d92431a4af70e8467cefd80a3ec55063ca68cadbbd0344040356c11ca8aab2f1
-
SHA512
010ac44919f4d831c528dad71bfb9de7886f4704afc358985aee4f410fad5c87acfae59c9d3507216628fc38968870c905cf2a7baa9f3cee45908c15f4b2a281
-
SSDEEP
768:S5UZ5Bb8vgkU0Lgg4OVZBdhFJr04JMJsBJ8Vj5wywvWsi:Sy+40LUM/dhFJr0o85J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 852 msedge.exe 852 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 4436 852 msedge.exe 84 PID 852 wrote to memory of 4436 852 msedge.exe 84 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 4168 852 msedge.exe 85 PID 852 wrote to memory of 1332 852 msedge.exe 86 PID 852 wrote to memory of 1332 852 msedge.exe 86 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87 PID 852 wrote to memory of 4360 852 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14f60c37f229cbec8724046df5b9a0d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2420 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2424 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5868729671607129391,6071966930907230639,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6c4ed1f4-3ef0-41ee-9a3d-3e08a439844a.tmp
Filesize204B
MD5ec2ea41fd357d4614169845ca3c849d7
SHA104e4888ce54e226f58c6549a0205fbcb050dbfdf
SHA2567577373261d4fca1b813da0a12a595646a53d3ca28a53bb7ab808eff878c0888
SHA5128aea1c97fdb99a5cb96b5abe27f6182603cee748e9506132b64fcd20a94ef70b0ebddee81411828789d452e97aef78af09c97c33682bc8fa2ec7586b9dccbfbb
-
Filesize
247B
MD559983afbfeb29e9ac70895463ac25e63
SHA179c009ab91def5cb691e00c94ae80ad2916878d9
SHA2562d6720efb396cac3eb2b06d1304555bec00544600368995ffe67086e397b9634
SHA51243a5b31880ed6d7cc45f5a919cf41f23131768c7f9dea2855b06c0e70505528099528e92805509efce70100eb4736dac629c6f4af20c2b2d012c245f75f025dc
-
Filesize
6KB
MD5e26bbc62c93d0348f76b2a16582a995d
SHA17cf9523967048d70c5e21f21ce998702c7340085
SHA2567dcd0312180afe7de4f6f8bcde67685188fc6ed09f592771021fd1861ff05565
SHA5126d90dd4d125289ab8f2f58bf9380c13cf3e931e8b65e1c3a40b85d76f3f40d49054541688d0a43e709998ed8d8d12f00d2d646186764c64235c2788f6f5b28c7
-
Filesize
5KB
MD58b727513ab329810a5592beb0d6c3f98
SHA14bbceec4403a4c4480bb2e8cd42455bedf4ea15f
SHA256ee8ea0fc00278a96d4025ae3449985ecb7524ad2328e34cef842b2a92252e030
SHA512e918baf2bd30b44e1933a0846a7e8b4872255b2f9f119c1bcc24b06b0a40df47c46a728e3fdb241c70d61d0cd68457c2cba31957e2ad31eac13900c99373232a
-
Filesize
6KB
MD50c49f4663e092e3c3771ddb26bee4309
SHA1ade07dfa2b8ba5a0497f56807031eb6dca37ade3
SHA256c3c6ee5eb7409bbd9c578c666a90a9d9aa9a3270ec1e4df8af5dc5d6b6cf58de
SHA512b29dbbc0508fe7099517ad9d8618e12205b5d9fef19e12c42281df73713d2527d6d432af6dee6c6633de7e1c60eef5558f9dfa01b65182d77a4379709e7f0264
-
Filesize
6KB
MD5490cc45649d308c35653b2f9b8c5401c
SHA1002198fb377c0998628091cfa34b96a0bdeac2b3
SHA256ae38c6d1d5bb44316fe90635f0914a6834e9086e960922ec6e4ce1da09841e31
SHA512a2900acd881abf8f2eee0bccb0c286de87d24fcdb52879c252257dcd58363834547868d9c7705dfaae96964eee0f6fed086422da851a81bf8285b8cf3ca6e57b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5502e4c250f59d6df7caec1aa5484991d
SHA1f206594f84e269d6a2ebe6512a52b131a3ab8837
SHA2565bdd25c24808d7acee4907d9db378051301b118d16f49af6ca4059b862f19865
SHA512c2095b58cb7acb2aab0d8c2fd57c1fb60d90a8f3c3ed7d3357711b2d656e6aaca35310e0127238f1fdf3378234ea14f76c0055601a6fe95b8d945201f976df48