Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
26e1ea87dc6caa5a699da8e5b9d397e8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
26e1ea87dc6caa5a699da8e5b9d397e8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
26e1ea87dc6caa5a699da8e5b9d397e8_JaffaCakes118.html
-
Size
31KB
-
MD5
26e1ea87dc6caa5a699da8e5b9d397e8
-
SHA1
29edbd32288f46b61b97a8bdaa61199fa5324dba
-
SHA256
8ce89612e14e1006a606ac2554359377428a19363b967865494445fd599c45c9
-
SHA512
a9d1c32533a1ce018c9566fe7e1f3ddc4f40eceee02c5ec6100441ff742c577436ca7de86e3cc622a8fee97a72f38853467d8b1bfad933c08587e4f7e3eb3e67
-
SSDEEP
768:8mvXvV6BTx37wxx9JKo7zFuQKFIYoOmjWDupIH+Y/0FE:8mvXvVuTx37wxx9Yo7zFuQKFIFOmjWD3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 752 msedge.exe 752 msedge.exe 3356 msedge.exe 3356 msedge.exe 3132 identity_helper.exe 3132 identity_helper.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 1992 3356 msedge.exe 83 PID 3356 wrote to memory of 1992 3356 msedge.exe 83 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 3820 3356 msedge.exe 84 PID 3356 wrote to memory of 752 3356 msedge.exe 85 PID 3356 wrote to memory of 752 3356 msedge.exe 85 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86 PID 3356 wrote to memory of 3548 3356 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26e1ea87dc6caa5a699da8e5b9d397e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f78446f8,0x7ff8f7844708,0x7ff8f78447182⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17667842741327715035,15167350294665458423,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
2KB
MD5ff9b8a09fc5730b06666d67a34a7bbf7
SHA12e3fc1c343333e2876cce4a4058afe660a4d8934
SHA256c9f0b257ad28d234a7bd5cfb4acccfb777b720a2f28b362fe5eccca66bf60352
SHA512ff889c7bbb45e89bc6ce9e8ebf467e967514c58dce4548d0031847dc9a68a4a8131f8962f72f33ef6775ce54ed60e647ae71bbbd134a38310440e0c0fc0a18fb
-
Filesize
6KB
MD56fa39eec52397bdc753403287790ae01
SHA1e8a3e4eb7798d48eb99de7bb595f63c5c6895365
SHA256d9358e1c58e0548b7db6556805c7dd4dcdf6d947d98e384a6d2298c02752f5ef
SHA512f076a1587062dba171ff4d8fcece7000cda264f98e1f21f657fbd53ac7ab723324e3cfa1d223eda7f29000963f667cc59fc8d1f396841ffbbbb73f333a5c4094
-
Filesize
7KB
MD518d775ed7829c111d1f45e8d6a92bdf4
SHA1b69993d5d2fe952ecef42077a0b1f5b2ada34aa3
SHA2563bc526473dcd089a9bc3bd18e567d8f8476aa897fe272ec457c626df4e469a5b
SHA5126d5ea8488c8a70d27cd060791efeaeea5a8e70e408f378e9864c9a062b26e710e8eff2a2b24e4c2392da67b11109067e0f6371e0f5ba55b31033aef78a8bda8e
-
Filesize
6KB
MD5640426dd94a5342b0d4a42ee859dbb09
SHA1c8828a64dda604f7a9e7343c4513992857fa006b
SHA256975168c2708a7fa4420bf267b4c4a570fb80f0375da278e1be073c6ca41b3fb1
SHA512b3e35f9db966de83f8e3b6779274224a672ca830bc2800332ec55477dfbcf46598c8248b27d0b5fa035cbc802f2f0ba0137182cefa1957aff41dcc9e9df95653
-
Filesize
1KB
MD5d757a607ea8e98c0882c03fb2653ad0a
SHA17b271f21c66a44d931d0f1d9a99769a0d47f51fb
SHA256e3a7af55c9e9b58e77fa49403a11e4181df79d6bb394c01235d6bc912b856da2
SHA5120f3ebaaf832a8a6f97e3dae6118eb258423f7b55ece50ae3c150c2ac6cee1fd613f7f353781d24f164f944560244f08dea52ad0e3dd9e7883fd5f10dd437bded
-
Filesize
707B
MD55196fddfc2a81fe20245887cbb4b3e23
SHA1b62273b07876c24570b61124372fda87286ff520
SHA2567e9bc0899f586d0648b3e1caad814ac26b177c47a9ebfef0692d8acee0d3a93a
SHA5121cd04c7f12e81cbe1079ee9ede2029ede768b15283d734b259ce1267d0db200b280127a8c2ee62062445df56f9898c360dea3a3f66b1d33dcc20aa7989cef882
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50af081d55723ab76cab517ec451312be
SHA1348447e109579594f7c6d48c9edeeaf180048f0c
SHA25630c275b3373fd002e582e08a7640dd995edd1aae9896bd4a7f0910bd2dbefb7a
SHA5129d60baac14a997e7e5dd436c401ec71b194cf1ec84d2561c1ec06e39fde98310fee9469ed5c98952978014edc5214c7d9cd915ebb400ff2cfcd0d262be55cb22