Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
30025a73139b39d848e5beed3f335293_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30025a73139b39d848e5beed3f335293_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
30025a73139b39d848e5beed3f335293_JaffaCakes118.html
-
Size
44KB
-
MD5
30025a73139b39d848e5beed3f335293
-
SHA1
a88fa5c385f3676eeeeb0dbfec816a9bceb1960c
-
SHA256
0f3833a357242fe321fab21662d8c8f6345182465a4e2208d1c8751ec881a975
-
SHA512
7a9ef6d1a4aabc28bc326fad227f3fdef24c531413f36e1660e742fb5212715a3e49829393ea5bb72e678b44003a202002e746475c15c7550d98224571ec879c
-
SSDEEP
768:S+/WvSFQv7W5wn2B3mHucrC/sQ/OQT71iQBw0jQ5GuZespft6XnAgn9EvYVXnAga:S+/WvSFQv7W5wn2B3mHZrC8esz6XnAg+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 3988 msedge.exe 3988 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3240 3988 msedge.exe 83 PID 3988 wrote to memory of 3240 3988 msedge.exe 83 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 1248 3988 msedge.exe 84 PID 3988 wrote to memory of 2056 3988 msedge.exe 85 PID 3988 wrote to memory of 2056 3988 msedge.exe 85 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86 PID 3988 wrote to memory of 2528 3988 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30025a73139b39d848e5beed3f335293_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5285083432283523726,8558219275400669933,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5eb29fad96fd812721a4e736096ebe169
SHA1c123e6d6c4137fdd8ada5d035fbf29aac0c5857f
SHA2563f104a6ad84aad65e0e0125fe9360e71bb1e11721d5a0521a32907c8d7f16657
SHA512c3ccd8af7af5325ec6cb4e74234a95a93742dcfd0a1d0eaf3a978501e51bb392135ce8624186e2d924b89d851cd0266607e8ce65b2846b0e68a68497b87438df
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
625B
MD57866c80d4c7480ecc31f40b8fcb0746e
SHA146ad83c9e8c7ac4529c3c1a3bc4a3a12e33ad818
SHA256e7d79dc5c04628ca4ab29b0d291ce960ab1b748ebb390bd4a5e96e62bd0bac54
SHA512fb92ece41e9a0f34667538de981294cf25e8a8368e3e1532917cecff2b5979a7d37312d8a0ad06f6d5f0c13e71bc52ef658e4970c9b796bd858320b610aa358e
-
Filesize
5KB
MD5a86576024d9e929b2f77bfcb4b850a9f
SHA1cae4f4639d3633ae4465feff36fe07f17840eaf4
SHA256bcc957968870df7b03d1f2e9ff9421bd2f43034a242517aa89d7e9ff0457e8e6
SHA512f7aee722c06873d3e20d8db9f269f33946fe89d4add2ba44a24ef39c7da5707e07d20d7de6571e6283f96dba8069180775df0388c69523d0ee279e1fef8c031e
-
Filesize
6KB
MD5d1655d56c62285b8a801a4f7bdd7ce07
SHA112272dd961959d04a62c63921885c2fc14aee582
SHA25642b81802fdc1ec25d65f47e1ddc2705de55e775d631f7526ab939f79ed23cbf7
SHA512204836de488be52617265b2115f2eaed55479ed8176de1f2fd6204d3a3c6f658297ec946a141658a8a386b8ba90ef978dab4dade6937fffb4c2192b4b00585e6
-
Filesize
6KB
MD5d362abf3f39305b487ae18bfbfa54b74
SHA1e56447a15ca628821daf8f2cd2d437e41b9c8d1a
SHA256ccc978ada905842e44da7973b7b88f54a442d1a1957f1707e4e853c862cf7a47
SHA512fa112c6d32a529aa3ab856048ded36951e201da79e7da09627ca9f42ff27624277cbbfa6b7ee55e96dce270fdf30a9d2c8d85334cbc96d6482e6110f5de4fc51
-
Filesize
539B
MD5af4af27c9b900c8f9b1d4cb371dd0bbe
SHA140effd409f81979fb1399818774e75a28c91b5ef
SHA25668fc4433f854433580da567ad36fcd8d1624736df2f3287cbe876fec3b76a1e7
SHA51203c26fb99818cbd35ae54ab374e0cfeb4f8d4656d91745d8f1a6717931b29485f34088e3b53d77dad04707cd6cb37eebc27a8503307462f80848623d8180ceb4
-
Filesize
540B
MD537ba9f31018d084a610afdcc2f24d1c7
SHA16c53b03f6577aa98819a56b1552e7e408ef6b8f8
SHA256f772fc801a60efea5f6d5494742e93b57e04bb360958c7dc75d21b6256bf691a
SHA51227206b6f021d3604fcff8b88c27dcd9e9ab1a9008c6dc5700815f28bae247cb1fcec837a78fb3cc5eab730acc22b5381a0b77a8f59b1eed9bc18af97f76f3f5e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389