Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
276597747dd5a3782b9ae9b4bcfb7a27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
276597747dd5a3782b9ae9b4bcfb7a27_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
276597747dd5a3782b9ae9b4bcfb7a27_JaffaCakes118.html
-
Size
132KB
-
MD5
276597747dd5a3782b9ae9b4bcfb7a27
-
SHA1
6e3067671895bc8ef31b2470120b8141ef9b9c8c
-
SHA256
142be8e2ce69e7e0af9d56f22b2e033296043e206470bf8705363028ccdd3ebb
-
SHA512
1b5630ec0d40e65c3b003e75cc757deb1b039c43ef46d396620fa2b6ed151a505720798b787cbfae37d1c6f1fdf51fce26e246d7c8fb6cd86c9d240b9bba10ae
-
SSDEEP
1536:MJfM9Mc67WTW1VG3Il4FujwChPlW9IAzYobUWAf5WwmWmWdYtU9IXd6tcQd5+XWU:6fM9Mc67WTW1VG3Il4ISeWBt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 964 msedge.exe 964 msedge.exe 4740 msedge.exe 4740 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4784 4740 msedge.exe 79 PID 4740 wrote to memory of 4784 4740 msedge.exe 79 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 4172 4740 msedge.exe 81 PID 4740 wrote to memory of 964 4740 msedge.exe 82 PID 4740 wrote to memory of 964 4740 msedge.exe 82 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83 PID 4740 wrote to memory of 2984 4740 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\276597747dd5a3782b9ae9b4bcfb7a27_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff98fab46f8,0x7ff98fab4708,0x7ff98fab47182⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10821738794873819338,14428480118644384244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
264B
MD5dd41a9998cc47985f7cfc5ada16b6de0
SHA13396cbcd4584076912b9d5f581f3faf80015c0aa
SHA256f3d4fc05b4090ffaee76bca740feac9fd4d6c3e87cada7659100a42b00c8db7f
SHA512d4acf73b91b98e9946971fa0a43b4ba9c3e706b8b3cae71db0a8e0fae2f13636dc7019a8c8e14f2c959b3177fb01d41ee6ad313ce43b07da01ade2f6b4e5369f
-
Filesize
6KB
MD59c22c540efeebc16eada6b2f8a0d5ba7
SHA1f5728bcb050370cb98f3300a6e5f30613aa4fa3b
SHA2562a0b566775822a52bfc05bdef388110ec9d7a21bfc50b50f35cefb9ff6113b8b
SHA5125078084752d9aa2ba8fad7073724d84549c8e2e2069db2be00ef31e8eb42c3e6b4eea2ce1d1278ad5bea249dc7aff4bb65a604d9e4e83ac2840fd322d4902f0b
-
Filesize
6KB
MD563ce79afcd930a97dca9f4d1659e1639
SHA13266d51a6201471f447689566fc9550ba7fa08da
SHA2561808675132dc1ed243a08395ba864b6a620e672663b6b864e38654bdcf895952
SHA5123de39b96846a3750705708b6c112a49eb12e319cf88b24ea82898b6ad32cd92dd382f1412edc574d76aa3e8f9447b5e9382f8086b398ccec0cb9b1be5ffcab92
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b0b281740f6ed6bbb630917dbba77699
SHA15816a9fcb871b25687052c2f4790e47d31f1e7d1
SHA256fdf67fa58c58316b73051c2fc646df90284c2bfd5cbbf2ede923377237e36782
SHA512947ff8c187fb8d8659133ac63bcb077c1275b77348205865f2620a0f82861e3c1b896845a0a0236ed7e992c2b7df9c1d02f991528a764e9a78dc94cb5036617a