Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
140137ab8c59ae7dc2a59d94b4d5e829_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
140137ab8c59ae7dc2a59d94b4d5e829_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
140137ab8c59ae7dc2a59d94b4d5e829_JaffaCakes118.html
-
Size
14KB
-
MD5
140137ab8c59ae7dc2a59d94b4d5e829
-
SHA1
2b23094470db41fddf0d1599c980ffe5eaa39bf1
-
SHA256
df9a2a708a32c8bf3a305e0e3f0c2b2e9f4195ea3256e1bb4ac1088b2bbd84c8
-
SHA512
ff249e325c566648b538e35b3d89ec1e8c216175f48e943d52e06015ab1a9f492e36a136e663e4dcfa04f129f38edf21290a496cc3870c3cf9bc72f693729932
-
SSDEEP
192:GGGqWZwmOj9gxbDcrxN0zRfF3jjlyQQ7nVfBibfBrJ1iDuv7Ysv7DjCfhGGrqhrL:GFZwmOjobUCn3jjynmrYjKjCfoRfFqM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 5000 msedge.exe 5000 msedge.exe 4144 identity_helper.exe 4144 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 8 5000 msedge.exe 83 PID 5000 wrote to memory of 8 5000 msedge.exe 83 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 3924 5000 msedge.exe 84 PID 5000 wrote to memory of 4856 5000 msedge.exe 85 PID 5000 wrote to memory of 4856 5000 msedge.exe 85 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86 PID 5000 wrote to memory of 4944 5000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\140137ab8c59ae7dc2a59d94b4d5e829_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5c2346f8,0x7ffa5c234708,0x7ffa5c2347182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,711637370919020887,15052900546126323759,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD5ee67a10ecbbc787b0062d455a13094e7
SHA116d8e7e28f7251763f2dc30ee074cb081a5ad9dd
SHA2562a483785137db59690fd5b5a862a4d154065e967c86a3b6e9505d4273fbeb6ba
SHA512db38e6cd45c7c8ffea9f928b8c205c9d9a0268eb3d6e044808a138b18b2a3e8a757728720fbe36236e4c81d90d4bf1ef2caadee7945240c73fe8ad6548b2b3d8
-
Filesize
5KB
MD5ab01318880e882d7b76cb2d28cc71fc3
SHA113ff19d1fd3d3ae0458b307c968785450587d948
SHA2561c8a74bcd0c5491bc426bf138c7ca6eb0c10fbde4b49934ac891b2ea4b7b2fa4
SHA512ab48d7791eec345cb3445b7654574e4af88401302ea076101361694d4e40d9507c233563f737b1b6f1f58b48cbe0a8bc6fa85360ec8bac9cc2981cdb1aaa37ef
-
Filesize
372B
MD5ba666298465d6a1ecb7af1fd91629c89
SHA1e2611542f0c37718a3015498f144b0ec32667532
SHA2566c530a313776be1a2ccbf98047701d8eec9c947c75a88e4ba5ecc97bf8efcfc8
SHA512f4faa32d3c03237e2edd8329698c284f3fec306bf6e3980482869be35938e3cd97ff18161a5a74387bc10d1c0980657fa9fe9e2ffc93d8eb972e5ede4f8f34c5
-
Filesize
372B
MD5fdb07e727b7cfe68ab5dfa618551fad4
SHA1ffb55fd6d840eb71757952d1266ba1f38930e3eb
SHA25650544072c591e47a408a01205351054330f488ff04eaeefc1f939afcb95b0182
SHA512945963d352bcb97f37ad4f87be79adf2d0832a90356ec1c86567b203c105fcef03a82feb408a0895f3d5432390c98ca1d603d6387e63ef1e4b696dee7d753986
-
Filesize
372B
MD543c37b3e01e55466f91f840adcf0da49
SHA164a2bf0f74e1684c4b1a4821e71faaec29d268c6
SHA256436b36a8e9579c443c317adf6044ab9e8dadbf49d9f434fb4cd86329e9be9447
SHA5123d96643dbbfef6f7ba1bab776a1c572a8931b4c40009fdaf7ff35cf4e8bbc3ba1d8d577353f3a60e2b2f11f7fb9fa8b6d61c456d32baf5682b0971e333892ccc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD520064dca3ac9d024658639ce6cd23937
SHA11718e1a8f1c54741512b27fb368a9b87a1ae2aac
SHA256babb40285875cb02dcd7e8235c529f8bbea0f519701a2a10d84bf1a755e39283
SHA5121d0b0f57e7416c2faeaa226cdef20e2ee39f516ea0c888d31d8d53f12f22c9390709f26ec722caba963ec9bffff5704cd85ab0b195b64e966df39fab759b1e6f