Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
3391822096b22ba9b49c58e3f333ccc2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3391822096b22ba9b49c58e3f333ccc2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3391822096b22ba9b49c58e3f333ccc2_JaffaCakes118.html
-
Size
23KB
-
MD5
3391822096b22ba9b49c58e3f333ccc2
-
SHA1
0896e50ca6e9e744bc4efa5cfde549f5b34a66f7
-
SHA256
041bc6b1dcb120e89d6c7cc146f98afc44dfa0ebee44a3acb4b568feaea03beb
-
SHA512
c77da44f02afa518cf5bcd3c5094a33fe4446dca029ed6adde27db397a035c2af53ff4aa1d89d6c7b0d57bfe6d840b6ed1fbeb1204ed2df4cbd3d970729b5afc
-
SSDEEP
192:uWncb5ndSnQjxn5Q/gnQie7NnHnQOkEnt06nQTbn9nQ9CnQt7wMBbqnYnQ7tnEYF:wQ/ZxA9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 1856 msedge.exe 1856 msedge.exe 768 identity_helper.exe 768 identity_helper.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4372 1856 msedge.exe 83 PID 1856 wrote to memory of 4372 1856 msedge.exe 83 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 3060 1856 msedge.exe 84 PID 1856 wrote to memory of 2752 1856 msedge.exe 85 PID 1856 wrote to memory of 2752 1856 msedge.exe 85 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86 PID 1856 wrote to memory of 5080 1856 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3391822096b22ba9b49c58e3f333ccc2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd1d746f8,0x7ffbd1d74708,0x7ffbd1d747182⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14460026952616857233,10726462723848217458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD532376605d6e67d77c7b800fdb09e2301
SHA129e11b1a2dcebac3c1dbd06d4e7f1bde57033308
SHA256c23a5bafd9a08012cc825e104d3ca3ac5dcda4ac3dbbde99004d53b01e9e4c6c
SHA5120d56717040b5981304ef32a9f82846129d3202c9c735c7f31a3c1e969889ffbcbc194a544bd781dd7c6d0f48c1418760f1bbfdd68049104f6c8ca6361b722406
-
Filesize
6KB
MD5302b5d8eb10bdc236101847c52a9c388
SHA1fb2ce99a07c1c7de94a0cd2b065cc82c4460882f
SHA256f632c03bf1c4e5c99ded2085f490a7e5964c77101f496e5b0cb60b3846806177
SHA5126794c56d6bdc30daf9bf6b17b83b39e286c077f63bdd817a25f85d7fbf1e44748ead51ae741d710ecff52e72aa9635e6ac3bf9bc9649f10f8bb4543c6e415589
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD541e3fcc42d08cea1cbe3f57a771a5bee
SHA1702003e04c9e282dd542f07cf4e26119d4c59a28
SHA256b5569c6f2f784636b38e70763b0bca66bef75cd98a1059719be6188ce996f25e
SHA51297dbc987f265cf82dfaee7c82c2f05adf154df28aef4fdef964ab2674c3bcefa80c871c6cb7f2db1b93783012869d607d2444ad5692e68162c4aa2a258be0aa1