Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
1fa96443f13459c33001476db4d7e9aa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1fa96443f13459c33001476db4d7e9aa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fa96443f13459c33001476db4d7e9aa_JaffaCakes118.html
-
Size
117KB
-
MD5
1fa96443f13459c33001476db4d7e9aa
-
SHA1
c5cb8519fad68736f32c8243da4d43ee026da399
-
SHA256
1c953c9221e0cbb074ebc39fa0af688a461e46d3b22bc7d50b6a45c549ae380c
-
SHA512
ce197860c18879a40451fef231ef2fa9065b49182c114873b5ad3b9d0cf7594fab983e89311f0c629814daeff1d85d0b441e83370cb12d55b672699c56fcf7f7
-
SSDEEP
1536:SCwyjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SNwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 3916 msedge.exe 3916 msedge.exe 1172 identity_helper.exe 1172 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 460 3916 msedge.exe 83 PID 3916 wrote to memory of 460 3916 msedge.exe 83 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4572 3916 msedge.exe 84 PID 3916 wrote to memory of 4620 3916 msedge.exe 85 PID 3916 wrote to memory of 4620 3916 msedge.exe 85 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86 PID 3916 wrote to memory of 4860 3916 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1fa96443f13459c33001476db4d7e9aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba2546f8,0x7ffdba254708,0x7ffdba2547182⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2180 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,18301527583233418345,2371346205989247923,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
5KB
MD50cb016f7e86440abe3f4ec994cc6a3b6
SHA1918e7052f52550778792b7d275d4937357602aee
SHA2568007550b26b42511ca0777d918f26cbd4d9596210270e01927bbb72f209f875b
SHA512d5dfda594894a373f0cb6483490c6d1639b6df48c9e07b9cad7c89e48094c04a13ee82e19ba7e75b983764b4c5e33b75e515778fc310860aa1f761dc58196983
-
Filesize
6KB
MD57461327a6ff0e4259f790ee36e2e4133
SHA1ecb8137642991f34ecd88758feff6179aa22f612
SHA2561b7ace1c51c7113879c32956d4e01ab07dc72a15de6a949f6f83cd24007e6b66
SHA512454d40ece52b0c7906895f882f390144425eb5ecf54d29b9fdf9cd1f3e1fe13a75d5aadb81da0b240a86c67e464f12f4e707b56ce80a0d158a9b77fc692db17b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51db25de997e3eba6c655d6a35f59d998
SHA1433753d0e9c87a258dbf7e966f224b1a9cd15731
SHA2561205232367a5c9c1e3ab233f7162636841f939c15841d3d7465a2ecaad6325ec
SHA51251bd3dac28b5d3b69ef3319cb66f76734ed95803315e80dbf33ea5a8a3346dfb0fb895d39eefe6bcb95122f10934dab9be3aff5818932ecc6442f8a7101db4ef