Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
4382a96d56a60fc7b4352e3cd683c0ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4382a96d56a60fc7b4352e3cd683c0ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4382a96d56a60fc7b4352e3cd683c0ca_JaffaCakes118.html
-
Size
462KB
-
MD5
4382a96d56a60fc7b4352e3cd683c0ca
-
SHA1
54fc8ba963dc8d6b0e288c4e3a420752cc567d6d
-
SHA256
acd7a580463567762c80c6f7466b9f124e0df9f848af45389b320092be0cf855
-
SHA512
5215fcfb2a525308f19d6c42cb8c76cc86b8317cfdc1f404ba1bf8a499798820c1ecd24e3f8004a3e0fb667956a72f7019879e12bd203d9f3232d3029a6b7c94
-
SSDEEP
6144:SJsMYod+X3oI+YNKsMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:c5d+X3s5d+X3K5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 1240 msedge.exe 1240 msedge.exe 5052 identity_helper.exe 5052 identity_helper.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3768 1240 msedge.exe 82 PID 1240 wrote to memory of 3768 1240 msedge.exe 82 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 1396 1240 msedge.exe 83 PID 1240 wrote to memory of 4608 1240 msedge.exe 84 PID 1240 wrote to memory of 4608 1240 msedge.exe 84 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85 PID 1240 wrote to memory of 3004 1240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4382a96d56a60fc7b4352e3cd683c0ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a88746f8,0x7ff9a8874708,0x7ff9a88747182⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13506754768130798009,3622684618590961548,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5b2e086cf0649930f78976bb9f4d14c67
SHA1e21cfb1cfa5d9c0174eda63389ed634e26e733aa
SHA2561a9fe2bbd47b7a9dcd25fe51e64f181f3895d3230f070ee4819b66949d1af960
SHA5122083dfdf3f53c7de77db5fe0c17b5619202c4402f0674807d625e4d5031ead9189fbf9360063a1ede24badc7fbaf0b2bb1d2420dea4682a4dee426c72c9b5cdc
-
Filesize
6KB
MD5f558888c6064f7932cbed4aeadb7c170
SHA1abb9d597e6f460c7d3cc186d1f5cdf32ede186a7
SHA256db539ecf9012bbe215b0e05526512048edaaefb54365e90735057548cda7040e
SHA5120b035b22d88b16ea18fbdc2a6144a2784faa5be7b270e03f69510fc8c73a42151e22cbfd58a96380acb841595a94a5095e038035dca4da39127b5eb9a8f6e0f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae5e413e4597b28257127f3c32226a02
SHA1a11f4f49b5e5c2d54bdfff8abe20150ad5e4834d
SHA256ff17a625aec9d1a3b10943440d018f6c1bc133064889504e4baf40c4009cb912
SHA512a87ff9a60a41232aece48b76ee82cab1f7327b7f4846ea9660b16313dad35424496d90d071e65670cce1c4a82326a2c670572323d0f4dfb02fcfc82ec3931ef0