Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
249242dc9ddb80b13a93f5f47aded7a0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
249242dc9ddb80b13a93f5f47aded7a0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
249242dc9ddb80b13a93f5f47aded7a0_JaffaCakes118.html
-
Size
128KB
-
MD5
249242dc9ddb80b13a93f5f47aded7a0
-
SHA1
f5db46ca317fac8a4a24638a8f2f18c62da7bd69
-
SHA256
562cf25358ce0127f12e31ab83b998f345d4b9dfd2f75fdbe6820047f217be39
-
SHA512
67e74a1dedff24cfe13af92c26f98f68b7f68fc4889aa365c33162cf7a2b180c3074530fc0c7f40b11024a761657780917af640e7860a7c1f23d9f846bf855f0
-
SSDEEP
1536:NLqa7UyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:NLqa7UyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 2064 msedge.exe 2064 msedge.exe 4728 identity_helper.exe 4728 identity_helper.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 5020 2064 msedge.exe 84 PID 2064 wrote to memory of 5020 2064 msedge.exe 84 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 3388 2064 msedge.exe 85 PID 2064 wrote to memory of 2200 2064 msedge.exe 86 PID 2064 wrote to memory of 2200 2064 msedge.exe 86 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87 PID 2064 wrote to memory of 2852 2064 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\249242dc9ddb80b13a93f5f47aded7a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c4d46f8,0x7ffd9c4d4708,0x7ffd9c4d47182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10958108301298902208,12074965038888555957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4c952646-f099-4bff-afff-b941b39a6810.tmp
Filesize5KB
MD5f23e631342477b56cae66a74bc03179e
SHA1ca51a9122a0943a7ac969a5cb7fecb6c923fb637
SHA256373caa63061f5ff539d6a851f0e30be8064ab5247f4cd9c25061c79b8c93eb89
SHA512e877b228a4198b6ba28b883ddd84db3a447a6f1fc9586d07492ba881688b3d5548cdcebc05dc8e97dfc755472714c8d979d68c2bffe986ba3de4204d0b3d30b6
-
Filesize
6KB
MD54be8aa1accd27ab8b854369db3a6cee0
SHA1b29e9e0e491882a5187e52ce3c75df9830de66db
SHA256a6371cf448172a5a78ec627b2dcaf5a97a9f7fd02ce477b58db260fc8d497c0c
SHA5122b6d19eb0d5f8ff68cde0bd6c9a013ddad7c5db1106bacef1a5adbac419186c7de91023bd089b97019a386d09767f8483d59e9c9a911fe0eb64236324b6da6c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52621cd00fe6bfddce89273932d2c7516
SHA1a3044a883a74160c7e2a7d5c977b5ecfc9805a28
SHA256d80820dcab3e4e0dd10d9e69aade57df13ee95855806fdd895e82ab14ed518ed
SHA5123eb33423733a8d4763e0e34938b95a7906715a201e7766ac156ea7dd439c5acb04dc6c73c2592f007cf5aab65f6a7436e2de0b49bbe0a46dc0e51ce1765a97cf