Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
383849ef7ea7292f0d4d81993e309046_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
383849ef7ea7292f0d4d81993e309046_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
383849ef7ea7292f0d4d81993e309046_JaffaCakes118.html
-
Size
313KB
-
MD5
383849ef7ea7292f0d4d81993e309046
-
SHA1
74441f89d9cbaf868a6b48d3f4c7c58a17dd5ea4
-
SHA256
a014d2fc86a3d5d296af42c65d70ba50faf5c2be3028dc08fdb3d163c47f0d1f
-
SHA512
a110ae5d9e083cd56c17ea39bde6111099425f0487185cb6f26fce46c5e54c25e5b89ee2af697d201f725a7d2eaad4b4791691c2dcd5611e6c79e48de1cc49c2
-
SSDEEP
3072:nVjUHUczaKVSn+kVRSkgzAc6+KEY0D9ZwlfPV1EMlBYXnqlqLoX/3DxjC2AZrWE6:6a0kVcMlfd8Lov3DxG/y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4760 msedge.exe 4760 msedge.exe 1936 msedge.exe 1936 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1840 1936 msedge.exe 80 PID 1936 wrote to memory of 1840 1936 msedge.exe 80 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 3044 1936 msedge.exe 81 PID 1936 wrote to memory of 4760 1936 msedge.exe 82 PID 1936 wrote to memory of 4760 1936 msedge.exe 82 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83 PID 1936 wrote to memory of 780 1936 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\383849ef7ea7292f0d4d81993e309046_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffa632546f8,0x7ffa63254708,0x7ffa632547182⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9385992253880530522,7420346295725717979,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
1KB
MD5a024f83889f3a90845c347b05baed573
SHA15942629dd3906fde0bb700bcdfae979e703d2eef
SHA256a2aae9e346257ccf116bbe331f309ef61ae988bbcec365b2833bd581c31de5ec
SHA5129f44368e15ef57011497e06f9216c6f4486e599c1a33a268fb6671fe575f1f45465c11f59e5ed50a3aaa23c683b4c464a43c5d7e932e57d9dadf8087bf8035d3
-
Filesize
6KB
MD55a1195513dae8b494967baa3d129c2ad
SHA1fef500302972a88922c3bf534e71f541578e4a13
SHA25620e0b3bed4ac222244b7bf209b9be3e727f0dcabe04bf7e963b5bed1bc35a2cb
SHA512647c918cd348a9d3f8884fae4378ed4130ec43c122dd7b96469ac304e3f1019dae2c30042affa4af29379c3b6dd08b7531ad0ddeaefa1bb957f9168660dd0d06
-
Filesize
6KB
MD50539f9254d4403ebf0b3140b71850e96
SHA1e99cdcd9671adb3f86d71223020d9293703c504b
SHA2565710e33e1370ca064c75917ae700ab4af2d455d83b160f76669f60d49dbe32e3
SHA512971284e2898313d3fea6e52b8c2229243cfd74f7d854d6529f083a84067a30d9fb9da50d1c59f8d6843ae98050ddbf87f788ff95a2986385def460e883637d6b
-
Filesize
6KB
MD58bfd7d3c0525a20e84920d487ed21cc6
SHA143977838c4c65389bb9da206253d3f3b4798876e
SHA2564b81c379ecc757118ee13380ed6b5aaa3869ca631bdab02375009f0e97763fa1
SHA512d904b96e16e78f402b5862d5359853948a560ecce29d47760f07e8be194cad24deea6fb649b0f2027867726f67d961c77cfb6128f8d35b58b04668a21bf6971e
-
Filesize
6KB
MD53e6f50763325e14b0df1c6b82ee20712
SHA162271f6d4a830f6f8ea35ca085dd2019c733d8f9
SHA256a6729dd0d08e84d9afb24c88d197fd21c02c83dc9929a759d4b343544218cd11
SHA512ddd297b12b5d66f89986362de9924c808ab7696de6aa3c787dae6b75fb9f106f81a833940eef0c4cc8915b1e52a65a0d0596c35d868a244a212666cd721e8c3f
-
Filesize
366B
MD5cd964828f7e2039bd32c104cc6a8c4ae
SHA13d30b2e0bbc3cf4d58e993f7d8f2336560cbc89d
SHA2560507a9d17b1a0fb383d4653b0aea84ce17ea395b4d30040a766a8edf4323c421
SHA5122e749c6fe11513662bc7754570a3827530f111bd78d83ddaf48f4e3b8f635e52d83336001b2cd7514ee240377831ab74058c2a0659c3d38c3b6a533943d162a3
-
Filesize
201B
MD5527556f9b7105dfde08e583c4b75a8c8
SHA1eb5ca1db9d8b55319f53374b00297213df8b06fa
SHA256518448e2b5c0db1ba6a01f20018419ec7a9b5b8618298dd5a6e5ff0446d6761b
SHA5123aa0e534e8dafa08b4563d3f3b4c225316e4143859af91facc7ee7484c728577b31a2d06d89da52c883190f273b6362b1b0238f6c4643cb859bd164eae856e72
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5101892e89b0c90b734d0c9c00027bd12
SHA1166683cef57dadc85764ce87badf9e10d2697f71
SHA2565ea6f9d9a02c21a108259b739f75106b3be4f64c64e8deeddd9de61caaa75fbe
SHA512f46402c0e30b947b3f52967db5a3e01202cea3c6aae90869a8cd6e85cbd792f0a20699df461a738c9d0e992a6c0f7a6b6d5ec7ccb7e3d8c0a8dc65dcb86e0b92