Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
2d8af7f5ad067bde5e8b875aa9384ecc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d8af7f5ad067bde5e8b875aa9384ecc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d8af7f5ad067bde5e8b875aa9384ecc_JaffaCakes118.html
-
Size
23KB
-
MD5
2d8af7f5ad067bde5e8b875aa9384ecc
-
SHA1
ff9d9b64e22fbdbe6e96da5497ea1aabbe45c7d4
-
SHA256
b7ceaee6ed52e2e13a780579c02b35899acdc01ff35a3d5fab68708ddb923550
-
SHA512
610878d4cb25f7a9c681023cd01af5734eee7d14743cb349ac56be51f4554ffc15f9a619ed8b58b8557c36c1b7396297b00b3ea858719fec03871e7b948d75bb
-
SSDEEP
192:uWfUb5namnQjxn5Q/hnQie0NnfnQOkEntrjnQTbnxnQKCnQtOwMBUqnYnQ7tn+Y8:7Q/zu/R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 1472 2724 msedge.exe 82 PID 2724 wrote to memory of 1472 2724 msedge.exe 82 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3432 2724 msedge.exe 83 PID 2724 wrote to memory of 3236 2724 msedge.exe 84 PID 2724 wrote to memory of 3236 2724 msedge.exe 84 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85 PID 2724 wrote to memory of 4940 2724 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d8af7f5ad067bde5e8b875aa9384ecc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11723746121490602995,14832030782577629763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5c6964b4bcd3f0795c972b2163d0cb35d
SHA1550d3550e54a98a0367b85dcd1bff66ae73a94c7
SHA256409a823eaa9efe09323fce56e6cdcbd90701adf5851412aba08836a80ff29d48
SHA51239527f4fc65d57a252f799c4b23eb5c74dab8fde162cb02e2b47eb58716e4f587e293b0d235378149cfd794c33954a156a3a9406abbace39c3965e0b74c505ba
-
Filesize
6KB
MD51fcd25772862f9cacafc555a068a3948
SHA13971c4cfb32864c8a54756fc9f0e0ae898129f2c
SHA2563299e6351d682b2ab6f342d32edafdeb8cad4195808215c1cc47e45061ac7afb
SHA51207eacb2878ca760d417ae98efb764f5ee2beb721125622cdc36a6652cad0c654dc0b357086ef750ed324343ba0565cc90e6f797d9011912194bea0c5273cea3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5175ee26161183b577774ea6b0b503f5c
SHA1ed3665a4d15b8a994b4a8de43b4019d0e691d888
SHA2565a409d3266b610a42b3deafad825b09f15dd80a09a2cc0ac01aace7225457b21
SHA5128bdb9de275b7cd43be06875c1989e5591de73b1d769ac69d14acf3bf08a454442780ae83c8014681d1f1ad066efc8173b234ab5fe06910d280ffac18bf670dde