Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
4722817f40c24b8b034a7a90bc9058e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4722817f40c24b8b034a7a90bc9058e2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4722817f40c24b8b034a7a90bc9058e2_JaffaCakes118.html
-
Size
28KB
-
MD5
4722817f40c24b8b034a7a90bc9058e2
-
SHA1
2c94ea3e455b69c989f383b04b168b9c1baa033e
-
SHA256
c82d6f829b194b5debf86be85a7a3bfdc2034dfc7442a25bd2977249f0a24fe4
-
SHA512
02bf7440c9038c9c6d802121a457ba5e8f885af9175223f4a110b5915a54afd72382a664bc32fdf19cebee9ef976034d65c9841d7e7f571e6eb979a42c8c2c75
-
SSDEEP
768:SazdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQG1Woaz2:S0dsFqvfug1C5m1CCCcmzm3C/CnCQy4C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 2692 msedge.exe 2692 msedge.exe 4512 identity_helper.exe 4512 identity_helper.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1456 2692 msedge.exe 82 PID 2692 wrote to memory of 1456 2692 msedge.exe 82 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4932 2692 msedge.exe 83 PID 2692 wrote to memory of 4868 2692 msedge.exe 84 PID 2692 wrote to memory of 4868 2692 msedge.exe 84 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85 PID 2692 wrote to memory of 3672 2692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4722817f40c24b8b034a7a90bc9058e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff201c46f8,0x7fff201c4708,0x7fff201c47182⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,7166679711191536121,8157565815906472665,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
417B
MD592af6448ebc1a4ba227285ff2312e153
SHA1076fe8884906b25730cfcff51d78575e0dbb5135
SHA256634e0a3a1b555cc2656b09ddee1a0f9a0dcdcaf4ad180f62bde35a46a40eb0d1
SHA512c1e9f6ff378de064d2e6b8905085f100ceb587726b49a2ea2ff3681a7fbddd60a7a69bc2b13922d972cf8536caa820bf7434dae36ea8df0b952d490f7e8cdfb5
-
Filesize
5KB
MD5a93829102bb988cc504aeec70ba33ea0
SHA16d8405d48eb5fab5f5ac784d185fb92203c75439
SHA256c4beae1ab6cb5f4a1f67d0e6f1db11cec5d3732348210f47a63536c8bf4ecd61
SHA512c27e0e6965ea8fa236acd688990ea49766a7e467b9ef73c92195b144fd0dbe7a03d4038cf35a173e671498caa7c2389dff63020fb520814f390fb4e814777cdd
-
Filesize
6KB
MD54cc73a722a32fe0df8369d5cd03de7e1
SHA13adea6b9a196b6a63c7ccc5dedb1edf975a3a718
SHA256a315e47298723355d3a3b5da1647eee2f42e2fd7fd4d76e74206dc118bf0b929
SHA5124dc6dae132d66c02c1f2616ccf3e6ce75de4d448428d433bb327bc1c8f2ccfa934c5758774fb452aab12d8ad31517e409013d582d193072a9ac15946dc3b0c6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59af16a0aee08605b0c6421001730cfdd
SHA1d7de7f43035c677fdfc0dd50e3693ee47d29cd83
SHA256238236c8e22d265a5d3c91cd281cfe8e3651bf57933597a0aa5a7e9052f56097
SHA5129d1eeda0c48865e1f478b77aabde131068840346a1dd3119a200b725dc38b638a68cbfc54a9891003c161ca1f5cfe4c30fc79074989671f437e3190f30a70fde