Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html
-
Size
252KB
-
MD5
2a551bb0efb68a51520fd42257c91373
-
SHA1
ae738fb7efdd2df8f8582ec17b4e861cfe6094db
-
SHA256
57702c46958cb737ad6d45e10b767c2b7b7844781d006af8ca2a8be910cac4d8
-
SHA512
9cefd0554490b616bbcd1738403e2a57c25e81821ede6825780bf1083cfc84a72ca36a6b17b304116d9cbf5a2ec317ed0c27a6f4070927209321482abeab1a93
-
SSDEEP
1536:bTnhq/Hqjyz4LRbAjKDpoKgdM5XVuPIVoRrcANguJHsVHu87Zx/3Mlir/pPN0/6x:o0RbAGDpoBdM5O/6Q7ZxH7rgT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3932 msedge.exe 3932 msedge.exe 4244 identity_helper.exe 4244 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4268 3932 msedge.exe 82 PID 3932 wrote to memory of 4268 3932 msedge.exe 82 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 1580 3932 msedge.exe 84 PID 3932 wrote to memory of 3960 3932 msedge.exe 85 PID 3932 wrote to memory of 3960 3932 msedge.exe 85 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86 PID 3932 wrote to memory of 1000 3932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a551bb0efb68a51520fd42257c91373_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,17385792937926435971,15163264917285797545,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
625B
MD5533a7865969ba3cf64a037cdcfcdb861
SHA17978021fbd2a9206c08fe5ede7bac9e762253505
SHA256bfb03698821463520e076161f79e0d034bfa5e14b8986a5085dca4a686c7a23d
SHA51227b9431414f184bfa3eae0444bd3accfb390a75dc3760e8a21bebc6b337ea98f187e86f034fe18c5cef212cf1ef1efc5b4744e84e67d90f093df90f5b4e40989
-
Filesize
6KB
MD55a5b31c2fa1dc955e04dd2b90a08e3d9
SHA118537a65d89d1722c3d904a0947331766788626d
SHA2563635d283c884e3c4acd9be9b9607530ce02b395bb8ef66ebed9a284e8f519a67
SHA512b65a3784c03b192119875ca72f193a10925fe2230e70ceff40006aff6df1e09af4d9101388d77948408bad91b1c75014cc8d36c6bcf19a28b3bb9ad1f24e99b6
-
Filesize
6KB
MD5a089aa2775888cf7f69cab75f7124363
SHA13f7465b01a0f45b33088dbdc0a2985415e278e61
SHA25644ef5842ff6c75a9226ed847c73697f43d7d4cf67f35e800a54588e7428a0ee6
SHA5128ec98e16065a25ccf684fc066af5bd3fbc4300921e4809a0d5c8bdcf399dd3a64d4410dbfc8be36b6bd8b191f3fc9d39d11fd9c3564549af5254106bcbb1c8aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b573d4a1d2666cb8d47dceac097de726
SHA11ce34e0cb1b48c9b49492443048023f15f95059d
SHA2566978659b35a9e569e84a8929ce72c830327e9bf3ba75c17e20edb2df27bce4e1
SHA5126a07ec769f4268fd83c48eadea865419f7f6afbed0a10020d79973ef88dd15ae9b1182ae26b9007207b784dc1a05f9212218a1e231973ebaad39acf33e65f895