Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
20d8ca9875a0f7fc948d7eca9a2abbf3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
20d8ca9875a0f7fc948d7eca9a2abbf3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20d8ca9875a0f7fc948d7eca9a2abbf3_JaffaCakes118.html
-
Size
4KB
-
MD5
20d8ca9875a0f7fc948d7eca9a2abbf3
-
SHA1
070f52f70f29961f3bb3dc4f20ae966b2788c90b
-
SHA256
d0e25fa83c914ee2701f43be53b3c5bfbbea0aabc89ada08f2cc09a25003943a
-
SHA512
418ee2f19ec4fae692466f77e3fc692d5c389a4712bca7f9b51abadd0b808e7a3028e7ec23d1f3713ad4bb9a6d7f61af2642e9f7080440ab3373683e67d23165
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMGLd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 3644 msedge.exe 3644 msedge.exe 1328 identity_helper.exe 1328 identity_helper.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4040 3644 msedge.exe 85 PID 3644 wrote to memory of 4040 3644 msedge.exe 85 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 2768 3644 msedge.exe 86 PID 3644 wrote to memory of 1636 3644 msedge.exe 87 PID 3644 wrote to memory of 1636 3644 msedge.exe 87 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88 PID 3644 wrote to memory of 5080 3644 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20d8ca9875a0f7fc948d7eca9a2abbf3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc923546f8,0x7ffc92354708,0x7ffc923547182⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12313809066797643024,3897654763711590605,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
292B
MD5e44388869f304362606c53a8b002ed08
SHA18b34aa30328ae6244ee3bcd66886653428221483
SHA2566646981986ec215a2b1ffdc25f33c92bd63a037817921eadc22932f5bc697f8b
SHA51243d38881c752df450ebeeba4e5075ed9a608de7accf4e8b5488f1eef84d987ec0ad62f07a25b97a150bf043741e990d22f544fc7a0956af96361a02cd9959e4d
-
Filesize
5KB
MD5264e697afea5f6fed5684e18557414da
SHA18ed2b839bf3fc4e953249272ec84c96143474782
SHA256b89a8b16adfd6fda1e9cd25ecdf690ab2bb3913d3904fd96448d93cde71c574f
SHA512a7f80c8e58df3a399fbe7363e9489ee1d0b5c424c9afe123ade4e03c76749a6e6d1109adb6435125cc695069819f19b8e6a3ea59d8d4f8f74eb76c041a1d172b
-
Filesize
6KB
MD522230fa0ec54e174b8a5baf9a720aa63
SHA1e1317ba48dda47202dd0d3725efd7cb0e4719226
SHA2569cd6c1b7f27b79ae7669f74caa057ffcf5957bbf94807b17a43fadafa13e8344
SHA51245b5916adad8d32ab79a550502ab259349015db6872558fc248e52d5e1747d8804ca0a5c320a2b62773858180d068ac5c80411d186ea8580fb22e5ea5ca5d087
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ebb832757777ce24fc12496689747912
SHA10f3c63ff8eaf2c0ec84174e190d94fa7a1eb9695
SHA25682f9b52fa5c0af54cd03afe7dd749c19c7f40b02e0dcfcfa332e522a977b7a27
SHA512da50e44ee2d3e2bb5f8677aa62b01758c211bf1303f62146fce421e4b518388ccdb5f7a25cf2489cdc9995d57c56993d7012b442cf6cc59672c10bc39acc8f93