Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
2988de8840a72c4286b9e85c5f32ef7f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2988de8840a72c4286b9e85c5f32ef7f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2988de8840a72c4286b9e85c5f32ef7f_JaffaCakes118.html
-
Size
21KB
-
MD5
2988de8840a72c4286b9e85c5f32ef7f
-
SHA1
34a898cfe613f4df2bceb7469af00f65e94301aa
-
SHA256
f5ac0dcc2a985df4164a892f9d3ac4602b057a4f54746020bdf22b32443b0354
-
SHA512
61f0796cd60b72d286c3319edba205447bc1318ebe591e912529e7c847d6e992acfb79b8cb8065a17be286a96cd28a522bf5818bfe327ec5488639bf24382a59
-
SSDEEP
384:TV1699lR/uEKW5HqkFFtmUIgD6TsYTEuD7oXu9+ObI+uZ80pzcSpjLJ5RVIMxu5q:u99lR/UyFtmkJW8Xmnu20pzcSpjLJ5Rx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 888 msedge.exe 888 msedge.exe 2492 identity_helper.exe 2492 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 1856 888 msedge.exe 82 PID 888 wrote to memory of 1856 888 msedge.exe 82 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 4720 888 msedge.exe 83 PID 888 wrote to memory of 5020 888 msedge.exe 84 PID 888 wrote to memory of 5020 888 msedge.exe 84 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85 PID 888 wrote to memory of 512 888 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2988de8840a72c4286b9e85c5f32ef7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe69fb46f8,0x7ffe69fb4708,0x7ffe69fb47182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3146702237137140503,9618858542906445805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
254B
MD5dbe62e415c91e403c59485069786f4d9
SHA17993de6edfdff5383e14c632a210932a8c802b4e
SHA2568bb28e4e44b3025437eed4aebbc108fc80f911c3ec54d4b220a05d01784f72de
SHA5121b367780002694bfe5f196ee87c837cd38d97c587d0af27c32f95a1f363d16a42b2d15ca15dd722f7e30e62a74d8bb2ac520f9ac3d27c2b78b2069a25e69d10b
-
Filesize
6KB
MD525cdbd74a6735c76a20bda3bbf5f3fbc
SHA189c52f06bd331698168fde8b0a9d3c40f3f24e6f
SHA256b4e4819b7b646926774eae5cc205fdbd14365c3a148e8eec8fe2a73bb765a6fe
SHA51265bca0aba66017f04270b6f3098d3cf308a5733b1ce3464534283d3f067f25970dfeb6805b4dcc0bf544d7bd7d0510ff0d35ca0e98459cef65c014556d6e5355
-
Filesize
6KB
MD5f8f21d7fcd242941bfd8397bfe7b61f7
SHA10c98b6425ee27ba890a51b8f61ba24cd73b56bef
SHA256a12c2593816dcdd88417494115daa633ee95cd3b9b087dc1d0761a415416d5be
SHA5125a6c9213759e7f1130e28a2ad2e11238da064223930ac8f2736b865ee6a72e1533ca6394d1ab0f44a44faa77790cdf92702aa515f2c939d4c71097b116c0e9fd
-
Filesize
6KB
MD5c298810b245f0ffe33570dbccb813be3
SHA1042d11d14801220a0526d5bdc952b96961a4687d
SHA2568fcd53c3a436a73dda9dec734a03dad5bdf5822bc1269c6f40265ed92ffc8126
SHA512c72a9828ce7e023545e7aebd8f975f88c7b48c6aa0ee77c888a4e593c755c58e4a575ce23277486cd61e65082613cd319eb6b55dfd5f2fca98235577057063c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ea55b2d77a5b69ea5f47857ce920028f
SHA175fd7f8326ff5e049c29357c40a1134371edf1d1
SHA256bcf183ea23eaa24285e36c497d145cf913813f5aa46e6dd3ca989062ecdbab76
SHA512cd6131ce2160a88e4e5448be9b9bd6615d9cf5b1318149eb0e9b31219c147cec4b6d3a2750a193c3a3806c5f6b39c20c364cec1467adaf5806fa0ff4a8b6829e