Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
-
Size
69KB
-
MD5
3177bd8640588c9d528143991a1226d0
-
SHA1
b5ac679c12200e13d59315a48dce5b8fb34b23e9
-
SHA256
b6c6def1635db541f70814eef6b7be1bb140cd8015c507af193f447bdf06b628
-
SHA512
eb2e8a9713efdd7febb53210e18e749160056c10324f5eeaa2d8603a84e9584c7cc6338ed9cde169f221d70bfa2f4086e4c20f4f6445e60e2a11893a32bcc536
-
SSDEEP
768:JikgcMWR3sI2PDDnd0g68n6ooTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JeeTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 4132 msedge.exe 4132 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3932 4132 msedge.exe 82 PID 4132 wrote to memory of 3932 4132 msedge.exe 82 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 4148 4132 msedge.exe 84 PID 4132 wrote to memory of 3568 4132 msedge.exe 85 PID 4132 wrote to memory of 3568 4132 msedge.exe 85 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86 PID 4132 wrote to memory of 4704 4132 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3177bd8640588c9d528143991a1226d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff62e646f8,0x7fff62e64708,0x7fff62e647182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15922232943395651673,9199941447971259094,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5244bf173996864f41983747b782e291a
SHA17bf7d2a16e9b8514dd83c05e35fd1b3d5edd134d
SHA2563de4f1c0b8405d3d1ca27419e2e01f36717bd71b29fe766034c69de23a6275ad
SHA5127b1d73d00f0a7b815c6cab47774e27f408e4ff118e1573573494099b426ed88432dc3f24ff8b7014a406e28ee3fab4983f3ae9ac92a9347afe7eb7075a4785cb
-
Filesize
6KB
MD506400cdc047255a76d476632a31b0964
SHA1515865069c8b8faece792af69290ab4599ac009f
SHA2567c295bc09e8b3388d382b983929adecb76d8ec26d26f60e6fe9530ee3f5130a9
SHA51233c050392b23f7ce911a43107a7763ab07e342a12a946cd6c49e3d30887462e59ae8b30a7a9bd80f30e7e73158b9ec5915192bed3c083feb0110afa33e980417
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cfba577176e00723097a3d7c5db107ca
SHA12bd16d7159bef28774759109ff1c1322a220e509
SHA256db1d01db5161b8c7da68b3b35827136ae37ba38d71b24d6e0327ebc92c89ba93
SHA512f216685b2047212f9323683b1232fc85a84d6c8106d857d25c5f87a1269bfc230838d131e48726b5d9e6ef79407d1a0fd43871e81a35d723112e857bfd05a84c