Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
31a04cef78a482429ea0a0bf9e93506b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
31a04cef78a482429ea0a0bf9e93506b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31a04cef78a482429ea0a0bf9e93506b_JaffaCakes118.html
-
Size
65KB
-
MD5
31a04cef78a482429ea0a0bf9e93506b
-
SHA1
11e9b5d8b72bcd5aa2be03e4c4350e39908bac9d
-
SHA256
ec6a71647af1814c7bd45530571402f93516eec5175f56ccc5d82377646ab341
-
SHA512
5223f8cf2db8bf685d0eba4dab4eadd1df22a284b7497963b4db5efcd3ff8caee2829347905d99f5bc9f5f8b5bbce226f457f890883691aafa016bd2a8614229
-
SSDEEP
768:JirjgcM0St8tN99OIs0r0G+cF+ncoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sy:JAs+OGpwTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 5008 msedge.exe 5008 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4400 5008 msedge.exe 85 PID 5008 wrote to memory of 4400 5008 msedge.exe 85 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 2372 5008 msedge.exe 86 PID 5008 wrote to memory of 3924 5008 msedge.exe 87 PID 5008 wrote to memory of 3924 5008 msedge.exe 87 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88 PID 5008 wrote to memory of 1488 5008 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\31a04cef78a482429ea0a0bf9e93506b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff935e46f8,0x7fff935e4708,0x7fff935e47182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,13639769816826911020,7311466506173209267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD58149953c1e3a005592951c00b327969c
SHA16be68c7c990b4ca87a52645118273a0a48b32b12
SHA256cccbc722f7b85690bae2275f4551776564529e025f2f388d8bb43f46d56b6ee0
SHA5123ed9e76b8e18da9e8816bcf448e55ba4cc955ed1e342fb3afb5ec5e1e9ab5e11b08b021c6818812a4c21af4d2c338549580b82a4992025ff39c7ba7457ea7631
-
Filesize
6KB
MD56c56778ad3cc4453e425c31ed5734cb3
SHA1698f59d2e32d4c7976937a5550f84778c9006c31
SHA256c58f1a0297474e60d4c0e5c713966a86ed6d4e3d1d260efd4e7891317a0f1ae2
SHA5122499a1ffe4b53363470be1df3aa44b515209f47bc45a4d8e47974b981a224da61ddbe9b98c2f49c87f0ddf05ed67cdd3bb984a8bac9822fbe2fb342bbd60ec21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c3104583819d0c1d559c23fddc0a5adc
SHA1b93eafc1563d044a0548779a99b6b571e97fbb0d
SHA2560d4bcb8039601831b39ffc2ce03f64cc0a7c2269f5c8fa1a5654ad7bb8eca7ad
SHA5121c91bd998a4ab8ec4ed53f42973a1e06476faef790db383c6eb6f1c980f207c6572288c7de2908a0e5f801cdfd9885aaf28fa84f191147cb348002750ff92ea6