Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
3373dacc2731ba463b328b4688863452_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3373dacc2731ba463b328b4688863452_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3373dacc2731ba463b328b4688863452_JaffaCakes118.html
-
Size
4KB
-
MD5
3373dacc2731ba463b328b4688863452
-
SHA1
4bd096a30f1e5a9b68820f8888b2cf4789a2c84b
-
SHA256
195dddaffad358a1781604aa332bcc16164998d4add42e75de3f73ad962127c4
-
SHA512
c7fa4a2d5131c48435061eb59d014c94ae6ea3a170635ea567c1d18c020b5f2f0ce181e95de76fe1aea26f5ff0933b98567a2b8a9caa8df8d5e51cc1c1dc71d7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWUGWfKo:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 4772 msedge.exe 4772 msedge.exe 3872 identity_helper.exe 3872 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1832 4772 msedge.exe 83 PID 4772 wrote to memory of 1832 4772 msedge.exe 83 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 4604 4772 msedge.exe 84 PID 4772 wrote to memory of 2316 4772 msedge.exe 85 PID 4772 wrote to memory of 2316 4772 msedge.exe 85 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86 PID 4772 wrote to memory of 3984 4772 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3373dacc2731ba463b328b4688863452_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb683946f8,0x7ffb68394708,0x7ffb683947182⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17960866071007204045,13965433204394299394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
292B
MD5fc1a963a81d5b49521578f0626c1210c
SHA1aa8eb86748bb751a150c42f54bd7a608e7ce4708
SHA2566f34d87df4082a68e65034faac9ec341ed34e55e5c11ef4def654c5eb14fcb8a
SHA5128ef32328a61a081b9626a41c81f5a230c684e0c27606daeabddca9538a1c16692875eadbc244c85dd28b839a3e271bcb0dc515adc8a70a2536aa93593cd1277f
-
Filesize
6KB
MD5f24aa64d28addd71ab649fd12278d384
SHA1df2a168bee8dd08bd9d630b5e3176be6194243c7
SHA2564673e8b9a02e4778b82921dd227b31a7a4cf7caa573de380ff3f545118e79573
SHA5122357925efcc0c0e69640c1ef280b8054bf5c599282c9e0fccd9adb3034d9ebbb058e0c65fcde9deef2e63522cf7650205111e3eeeff77ced41294b4e23fcc12d
-
Filesize
6KB
MD5021b981158595b27bceb0b5a04c7420e
SHA193cedcec2f785b0d66630c73a83210a4d41cca83
SHA25605a06ec677c5f465c9874235b17fd1bd2e7bce7e9c57eaec0df1aac8954be5c5
SHA512250edf3e0e2a8334cc214a296d00da403e079c571430872a6513b0a0f96875186f2599ed315fe92f914b3e63c996754e530e8bc001047043b1269bc8b722a709
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e845a97941c9a03d77c7bf05eab41c7a
SHA16b6a2f489ba757fa50243ada3bb98d3ef62a61b9
SHA2569e706dcb0620605f13866c7b6819ab1b946aaefee2f8b255ff574ff220c37fb0
SHA5124ef219672730bb383fd807a6188be65dfd0434ff6af26fa8d95910436cb4f551d89d4c9c6107e6e02ba365608c4fcd6183f04b95db67913140d37968206dedc4