Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
-
Size
70KB
-
MD5
40afb6515d0afbb59193e3e804be7e01
-
SHA1
f5b27b7d17dfa84a4efbe8bcbbb153bb539caf98
-
SHA256
cbad1b2565d826ca7a3c18fa859eb84f084d9233e7b790dbd1ae7ce9f2681268
-
SHA512
6696af71b95647d4d95811ebef1b1d06ceeac19b2653d93c5012bb07360a3df646e54647c924d21c9850963daa1e65390f8220f9847f7ce015016e0b6e0d6022
-
SSDEEP
768:JiDgcMWR3sI2PDDnd0g6rVdrZqdRoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:J9ETvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 1504 msedge.exe 1504 msedge.exe 2420 identity_helper.exe 2420 identity_helper.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2332 1504 msedge.exe 85 PID 1504 wrote to memory of 2332 1504 msedge.exe 85 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4004 1504 msedge.exe 87 PID 1504 wrote to memory of 4004 1504 msedge.exe 87 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88 PID 1504 wrote to memory of 2404 1504 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11023055282682292920,7784021847113976218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD53913ac931ed635a9691687587b0a4599
SHA166700b5199cc8a2a065b0fa04631aa19e7f9d304
SHA2566a40cca5752de46be74902107d5de40e2d1215ef020933f7eca6eb4780bf3526
SHA512f9c95a24be5debbadd799a6f35c97ca5f92f8209f55ce8b11fb8bd33ebc2beee05e223794fb8f63ccafd6af17a812f3ec0a55d3462f12974bab4f9d72484dc4f
-
Filesize
6KB
MD55db7af40189811bfaa884321a156ada1
SHA1868eb4a9cbe6c25235c0cae4e56c8fb7f358fb5c
SHA256aef1c5b44f625d09ececb2fe68ea50a8b1d393c55cfceae600ad1bff14904fab
SHA512eb99d0b8d116460c1793e7067c71b7e49cbd759863e56a1df34849221f612709e03f1be070f7cf893d0eec6a809da3519bf2501ec9d3fc01ab834ee9bb5de8d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD562cb0429b62cf97878d3042a0e5b71bd
SHA1427c0ca3595dbaec5c423484b3085a0364e36436
SHA256ce14fa8f691cdb4a6f63f555108dd07e71ebaac8e5d00b1bc74148573c9f1d64
SHA5125c3a7e75ddc11facb793b754eb672ce0cc88da1ea28f57ba5406e000b247821abcaf9f699a47d4624fdf0a4ef995aae7aab32f489c8a18b3dfc2563f44dd93ee