Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html
-
Size
461KB
-
MD5
4d188a780b200e9ee0f12501e0370004
-
SHA1
ebcdf65b3ef3afe3f4c3a4d46f19ca8ef39dde0a
-
SHA256
a53b6f86f6035bda93682ae199163d3389e9b4ced422daf05c89a56d135a39b9
-
SHA512
9e0c60cb707d4096fe5bb42ddb67d1d5c35a0facedb79cb68da0ef327b3d2956b3e96cfc5d55da2a8ac46886f24a0ca80f297dde22a004d521342e1b5de483e2
-
SSDEEP
6144:SLsMYod+X3oI+YyV9QGsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X3Yx5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 3592 msedge.exe 3592 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 900 3592 msedge.exe 82 PID 3592 wrote to memory of 900 3592 msedge.exe 82 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 2944 3592 msedge.exe 83 PID 3592 wrote to memory of 1492 3592 msedge.exe 84 PID 3592 wrote to memory of 1492 3592 msedge.exe 84 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85 PID 3592 wrote to memory of 3544 3592 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d188a780b200e9ee0f12501e0370004_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,656339536853133950,7867200059736926865,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD51f183b78799603b64b1262d0a941bb87
SHA149d2603084f0c564e5fad211dc3fa08b5a025be8
SHA256f0dd27c5050e71f04b0e448c84571479a50225e28af8e4c26f50aec542d19021
SHA512d13f55772e92b54a0930e3aa28bff266f070a278b4e3cb10a43f7ac8bbe173c57c12532ebf9a53fc265381980d16f851b2718e429e6455edd9f2ffeebe042b3c
-
Filesize
6KB
MD5b9ce479d1abe3fb95a4b2b0cdb63756b
SHA16094d524ad2a98f346393cb0fea8e916eeb9c503
SHA2568610f224187481f1c7906abe7fa3a1289bcba091cde979d20ae3e93bfd9b37e4
SHA512a09b1ee7c779ad9a90e6a2cb11d0b564d88ba8755cb2f91e755e3e8710d7887150ca66df7a1f0641b62d0ace2834ecf494de6740aed4c829785a9b265867786d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50a78d153ce5d8bbf335bc812011baf36
SHA15632ca4b895e163f7bb362fa64476d663aa403d1
SHA25676d72f492d726eb02f936d8d1403b8cc965af786443c7362b24779d1c7507af0
SHA5121bf86740e0471a7b3bc25ee191f0973a21856296ed35c688ddf794dcb2a98f34b5538c7ea137c402ce9437a52a796699ee61e1416e79caef7e1d08b2769748db