Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
29c106546dff52c513a4c5f03d1fe261_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29c106546dff52c513a4c5f03d1fe261_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
29c106546dff52c513a4c5f03d1fe261_JaffaCakes118.html
-
Size
56KB
-
MD5
29c106546dff52c513a4c5f03d1fe261
-
SHA1
274a0deec74e27e40b172becc40df1696234635c
-
SHA256
3b0526a2038a6192ae633c5d32a4a46c071dfd87948e99ca8f95e932deeca1f1
-
SHA512
6575b38dec9fe34cf6d8c0747d03b42bd92b2dd90949e9a970db56cca72f342d0aa58c07c4cee5d8c2eda4f71f9bd7d1d34bf8140010fcaa6874a5616afc9d97
-
SSDEEP
1536:H9nVELrYVkiV5iV0YqaYqeYq/YqBYqbYqoYqkiq4YqXiqzy8yZy0yOGdy1yvyNyE:H9VyVQpymnpDgsCPdryxD0uQ0QNo4vq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 3704 msedge.exe 3704 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3040 3704 msedge.exe 82 PID 3704 wrote to memory of 3040 3704 msedge.exe 82 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 632 3704 msedge.exe 83 PID 3704 wrote to memory of 4420 3704 msedge.exe 84 PID 3704 wrote to memory of 4420 3704 msedge.exe 84 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85 PID 3704 wrote to memory of 4292 3704 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29c106546dff52c513a4c5f03d1fe261_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e1046f8,0x7ff83e104708,0x7ff83e1047182⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7475677805939443515,16258318357696358360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
384B
MD56ae7a60a865a5c9947e4b6567cf4c132
SHA1192ac575f77ac3d45330cb04805c1e713989371a
SHA25603a79520e7c78cb745a6b55092f868d72bbbae79e0bdf568d6193d52e65da5e5
SHA51264203524582ed5a176a02fd53a9ca371b3bac9d2b54c36e306b75ad3f905753380f7fc464f4aeebcafda82b9444ee39036e08017966397736845cb4e575a74c8
-
Filesize
5KB
MD5e62a792c32dcc88715108f9be0d934ed
SHA112ec0f390274bd53303f4978306feb5f3beedb75
SHA256ed38bee913abd569fbfbb0d47a6cd4ffb3957dd579300e9ee0b96671b2379e51
SHA512794341dd8c7d5f7d930843ae4cd193e7c1bcbd52056453c4089780bab614d9a37a68305bcee0005fe6531719402b8839b97b9dee52f8aa581bddf637191ffd81
-
Filesize
6KB
MD58350b576a71ed20c58b2371f8ecd74a7
SHA12a728d6b3c35bfd262ca6e7c439a3874022ef553
SHA256000fc327f3930644578f7860342bf074367875cac2880a1cbb7884980137a7e3
SHA5126f2b3de8577273978e7ffd05700e63fd3938ff8680c16ec80039461bb8e99322eb9b195da26478f458cb8ecc736abb386cb4c8357a886c1ed29e4f44be5aff41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD545982e17f61009657be97060ca2a90ed
SHA1b33592eb87fc053052573168c5a9a30211556a75
SHA256a6cf6981c9f690efd28e7c4bc0258cfdf47d64f19b9fed31e6c4e5cc48afe933
SHA51247b60feb24de89e2f0ca19103b6b2ba6a813f972216f5f37c24c50750f8a7d95286c8c39e927806ceb3ce16a497fdd011f1246eedd972b2833cefca8ed74d82c