Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
34d5f0e23b2578767a56d05c6be238e3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
34d5f0e23b2578767a56d05c6be238e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34d5f0e23b2578767a56d05c6be238e3_JaffaCakes118.html
-
Size
723B
-
MD5
34d5f0e23b2578767a56d05c6be238e3
-
SHA1
fd8dd5a4010a9bfd015c60969bc61a0dab5b2839
-
SHA256
abc763da8e5c2269a996feb4433c041a977ef8fd036e7f9658784cfbe66fecf7
-
SHA512
e9def2e8dc20453d8f4f0ae81654469c6cd97ab75d8012a92b51d8b92c4dd5c016a980e3bf7279b3ff8af02af6845f0efe9233864e5f81503b6313bee478b456
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 516 msedge.exe 516 msedge.exe 2260 msedge.exe 2260 msedge.exe 4040 identity_helper.exe 4040 identity_helper.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4632 2260 msedge.exe 83 PID 2260 wrote to memory of 4632 2260 msedge.exe 83 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 2468 2260 msedge.exe 86 PID 2260 wrote to memory of 516 2260 msedge.exe 87 PID 2260 wrote to memory of 516 2260 msedge.exe 87 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88 PID 2260 wrote to memory of 1296 2260 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34d5f0e23b2578767a56d05c6be238e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc314346f8,0x7ffc31434708,0x7ffc314347182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2065868076095763571,16747575092789117252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5e3266d76caf55daec2ca8a3b979085bb
SHA1f423453a045c9bb9de9cb12a9ed5781500cae766
SHA2563a261ccc1167f0715fa64763405b1b43da66a91a2fe80081472edcd960fd2674
SHA51262c945497b66e4cc8e6249e867ab4bbbdd061391747b0188de24998804297902da3617e1e08639fcae0af011e1802046daf313b6abd93915ceca57a1356d5cf2
-
Filesize
6KB
MD5a109160852da51613f7223f793b26b04
SHA1ea3491a0afd1e91b7b291f46dd9c768548488a8a
SHA256f4f0a9685064db4e3909634bd43af57ef8a5406b050ec92ffc7087053e13e2e4
SHA5123e97ffe56bee7eaa8a129dcb9b0b6dfbe027a62ded5ec07816ef74d483e33f9acd30560f151c49c43ca9e4ad5d548eeda5d4fbfc1b8224fc6265d3bf366af595
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD541a177b5ee31edf601828449f1109752
SHA16fba6ace8e540dd2a05eb82e9a2abf22a3f4f5da
SHA256e17404e58c4424fb3dde9b7c7d12b7f859755a0e2a007fe2cdc85e901a127f76
SHA5126b779d6ef00b670d5a74f48b0995a5115964ec4fbe2403f17fbf6d9f3146979453922c49ed8296554b4a24dd01c6672e506204bae40422d13a679e3c49fca510