Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
4aecf6668a5e162974b77b786adea7da_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4aecf6668a5e162974b77b786adea7da_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4aecf6668a5e162974b77b786adea7da_JaffaCakes118.html
-
Size
71KB
-
MD5
4aecf6668a5e162974b77b786adea7da
-
SHA1
8990b9de2f3143631d42a0214f0be2bce6d5d70b
-
SHA256
b1aab52a56fbe9e1ae92a9a1751c2430dcae6eea20626f207e5cd2d198e08e48
-
SHA512
e6d1a02fa38579ed3ebb3e9c28beba4ee89ed16b3e45d4b4c824ea393755f4e44deee8c7f2801925309ef7ec743a93980a18bc53c7285969c9f491c19673eab7
-
SSDEEP
1536:XWNV16ycnfsA+GJ0tiUD0s0QM/8vnFufR5EjhgPNWp0/b5W5iOvyvtZPyCmsQIn:mNV16ycfsA+GJ0tD0sSMFuk6PNWpYb5h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 3900 msedge.exe 3900 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3492 3900 msedge.exe 82 PID 3900 wrote to memory of 3492 3900 msedge.exe 82 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 3564 3900 msedge.exe 83 PID 3900 wrote to memory of 4660 3900 msedge.exe 84 PID 3900 wrote to memory of 4660 3900 msedge.exe 84 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85 PID 3900 wrote to memory of 5116 3900 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4aecf6668a5e162974b77b786adea7da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2176 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3136299875005480414,12031503627847562832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
334B
MD59ca513121c16dbd7951a5bed35c677df
SHA19c18c1ed06b9b99bcd3642bdc258435b8f64fad3
SHA25698fd864aab116772012a3ba895b08f8a93e41e070d32548330d7242c1168040d
SHA512843e6a0345434872d84f7433e81aa02dcf8b6083276f22443446d26f33204cd3186f723dc8b2f6bf932babbc55a11ef9ff63165ea80f71dbad8f178d0f731a9f
-
Filesize
5KB
MD570676ec3b22d8274dc8b9469babda9aa
SHA1920e583c3468ae057441f8bf2a220ce2f4e49574
SHA2566a789ac9a50371117ad7aa6c2cbb1008cff020dcb73fd7300679592e475d3df3
SHA5123652322b40712c528638c5236a113e92be1e2ef6f8a45bca3b33829ec1d3020cf231311eb9697e7cbe6ab10525ee8f41fe4188d3d5d718f3c94ea9aab553c3f5
-
Filesize
6KB
MD50d2e04a702f62970e6fdd2ce232b5b09
SHA1199dfb4b303b48fb2986136b1f9d8902f92eb2a6
SHA256b4aa27f23f22fab06f1556ab62566bf14f7c37228c706bc974e1d5cbfd3a11f7
SHA5123d21f79c5e87a540271d9f74ad147445619620a5dc62054332da9f819b3baba9e286a8bfeeb9357a56f59a702c242626c6fa256a6108f03fbd159d42c6e3ceb0
-
Filesize
6KB
MD567bac79e693acb95ec132608f9b51aec
SHA1aa26b4c43de24e158db08dcfb1180d9cabb8bfd5
SHA2569806b5abb976d5812983175bb0154b38d0e76e72a5f963fc8ef6575ea2a8aea7
SHA5127c4a12b6a29accb0a8c71f9893359826d49c96b6e07c7f24d9d3132e56e59c231940dae91bf81fd9ee4201c6f0dc5749bffb2d7f21df2409ae3d0eb531b95dcd
-
Filesize
370B
MD5b313b568e2d93fbda7422c4b16264ba2
SHA137528969c393b18779c086b0d7f23da865cb76a9
SHA25670e2b9c8e985707e16d7b20376affbe074c6aae1477d58506d6125a2063e59eb
SHA51270c2350c8c23d1b98d1e91ae79cd68dd923406c9f85c102e302ab4612d0209afd6cbd98620dd979e4389d9636f0a8bacca1d019d5cf99a67e7b5e693274fd324
-
Filesize
538B
MD57fb7e7db0347f2f486d014f3c299ce11
SHA1afefb4a7b270e1f7fca720da7d0375965f203307
SHA256a77b10fe06535b3c40c29e466e46969aa56a13eadf45c24b38cfe2f96150902e
SHA512cf79de179b78bd8355f724e93d3e6b152704fb784c92adb92d5afd678124b21f844078c04d088f0390baccc92ed2163ffaa648caa5d1fef348a223dbb85fd223
-
Filesize
203B
MD57da74a71176d4f28a057fe8c1cfe36c6
SHA1c63d1e49141491fb1540b6488d9d5cf7d5a681fe
SHA25600fa6cdff9d313c2392f4d97085d65f5b334348f4099e88f36c7e3f404f27700
SHA5125abe2d0e1a6aed06f5f88ec9fab97243736b25b2e6c5c7361c97d598d33908bdf2da411cffc5287ce8ceb3dd8d4047e47df1e091ab9bc7bebffcca06b401dafb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD580d57a6de170782420f6db3a1eddc92b
SHA1d6bcd91ed34c9fffecff454eca1dbc736ddbad15
SHA256e79ac6c54a628f7b7170551e35a0bb7809618fa4c670b906b6e0c331f0a920e6
SHA512a10efa80b12d6819a9cc534f8de1373f79a5bceb6c79361c692ad4de25a8fc09c23a65b7e7777e033d8cee4a98f2a78e9aa5681609aad01f0f372a996f5ca627