Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
402db3956f91d2e7a97192bdb29033b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
402db3956f91d2e7a97192bdb29033b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
402db3956f91d2e7a97192bdb29033b4_JaffaCakes118.html
-
Size
36KB
-
MD5
402db3956f91d2e7a97192bdb29033b4
-
SHA1
4179c93158060640c8425f18cf77b075fae15b77
-
SHA256
aa8e75867db60d03559190484454bae258baa9febc9534668583b942a328f0e5
-
SHA512
2eccd06f589abcc78f6a6d923f57bb8744804ef71ac2b14b7414fa3b6d46d4fddb76aaffe5ec97ee1a42db473b5e5f48832a5ff8dadd399d53daf532eb20def2
-
SSDEEP
768:zwx/MDTHdV88hARZZPXAE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TxZOd6DJtxo6qLR:Q/7bJxNV/uxS0/88TK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 1640 msedge.exe 1640 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4056 1640 msedge.exe 82 PID 1640 wrote to memory of 4056 1640 msedge.exe 82 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3040 1640 msedge.exe 83 PID 1640 wrote to memory of 3580 1640 msedge.exe 84 PID 1640 wrote to memory of 3580 1640 msedge.exe 84 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85 PID 1640 wrote to memory of 828 1640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\402db3956f91d2e7a97192bdb29033b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,409582379910272363,15982724859954073874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD53ed93264b4922e2031b01313a66e4371
SHA1f53b8f596dc7bc4011f68d5c064d9f628760141e
SHA25691a06025a254d6a13a7e72dfe5e147267c81062025ace2314a6678b7c5272a46
SHA512d76be89c83efbaada8df91632767beda0cc8d78f12f9b0cf9db50f0abdbcfb3bbcedb01f1f7149ca73341655fd54b2f53096fc7dc0a53700fa2634ff84d7d460
-
Filesize
6KB
MD56cf0a9941fbc9b72fdb0b459a20a020a
SHA1f8e2a7500869eabf57b78b9c04c73747363e02d6
SHA2566fc48e7d129fc291968d150effaac21d2633720c56d12ae44db9bc48e1839174
SHA512591b3f6004c3cda6b92f2f5f639b7be6b24ab540463101213de49d34b3bc14a40d666e5a0db2611a6eb72f9ce62d250ea48f86d2aab375b015f51b65832d2efd
-
Filesize
6KB
MD56a0e98053f1566cbcd5a2b44189410b4
SHA1795a0b6b8f5e5ac6781535bc48c733d1a54d0127
SHA256bf597fdbef48ef227ce41bbb288e46b592a531cbf4e00b51a952b246559eb069
SHA5122778cbba8a1b6241ae684f17e1e67eccc73502a456cc0951055ca754bc536ea6b025f42e22006f192432f7c069cba6464cfc833c73be333f4ea23c4961f24b7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eca3b9b361f87d7726a0b373605e88cb
SHA18d17569fd3e38d914d853c36217ab61676ec4e62
SHA256c4b375191903d9c7755388c0523092562299fd08ba112ac826d2d6df64758a28
SHA512095da143aa7ca08c214d97575aea3d5b3898ac7bacff71560942d6a6780ad545dfde80d2d820173f3ad804dc399cf73b3901ca802a6152a8aa9e7ae6984709fe