Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
4c7dba26027523f9f0d66d6f1e2f8f70_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c7dba26027523f9f0d66d6f1e2f8f70_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c7dba26027523f9f0d66d6f1e2f8f70_JaffaCakes118.html
-
Size
25KB
-
MD5
4c7dba26027523f9f0d66d6f1e2f8f70
-
SHA1
732ecccfd719bd7c10c8ec11ca0144fb5952249b
-
SHA256
e93f5326f4e5e2a5113d56df9230bc4dddad9e0c6bc1577322395522b81fb785
-
SHA512
4f8c0dc29b5af39959eadbb041ba787daf7a51bc2f3ae9477dabee66010d4084b079c780ffaa28de0ef81ed01d8d6a9481fd3f955c47838752ad238937fe04ff
-
SSDEEP
768:SzzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQGAnnp+z2:SXdsFqvfug1C5m1CCCcmzm3C/CnCQ1n3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 5072 msedge.exe 5072 msedge.exe 212 identity_helper.exe 212 identity_helper.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 452 5072 msedge.exe 82 PID 5072 wrote to memory of 452 5072 msedge.exe 82 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 2760 5072 msedge.exe 83 PID 5072 wrote to memory of 1168 5072 msedge.exe 84 PID 5072 wrote to memory of 1168 5072 msedge.exe 84 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85 PID 5072 wrote to memory of 3164 5072 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c7dba26027523f9f0d66d6f1e2f8f70_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb884446f8,0x7ffb88444708,0x7ffb884447182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,767016784685928119,16039214389147078697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
350B
MD5267553e869e1b91555ccc2aaca89ac16
SHA1316db28cde9f39c451d4ff814ed37e280a084c37
SHA256c89da6190b9beb5ec790cafa124352a8623b7bc72d6e6ca589911e5d5a2eb374
SHA512753ca8a8b6f5266328c04321a77f7ef20d98cdb5e5790f28285d8e0ad2cd157bf533079da65d44f48a77e9b6dacdf091f722d72f6891dacf18817ca317a8740e
-
Filesize
5KB
MD5b88ecdb0ea943974036be0ca9ef9f1e0
SHA172592191f58a945ea7bae6882a0f860bf66317ca
SHA25682917ac40559b478dec72ace5c59e299806d85373c76eb2055f9a695ec854d42
SHA51227ef7b55f7f57bf2cb275a237fd829a6e0e299638101e235929d1decb92f215ae2840a56bb40da58a4c56c0ad6fb0e72650549395afd9c334018e6b6e814c815
-
Filesize
6KB
MD58ddf3edea7228b0ab6735f730f645fcb
SHA1b40e5345eab1ac3d91384a41aff31c4e97ac7a9f
SHA25652a9ea69f674cd87aa84622f5995517ad2ea2baa5022a7577e4b8ff6b8ac5aee
SHA512ec768daaaa8b859d35d21e42b80381eea7343510987125e6d0e2c3192f9a739dec9691cd95870046744b70eaad90f5cc5eec3d74b755ea361c77d17d3dc6bd11
-
Filesize
6KB
MD578812480b8bd8d89033b84a30a722389
SHA1bc72fed0320bb1417a787a5a656e4dcefab68fc0
SHA256a43cb31ca4b8fe19882db94f79a99ecd66d70c829565129da711e47bad2975e1
SHA512d9aa95aa63282cb34a725b0c6396611aa504dad4ed0421e937575b39ec76fc2cae87b38ca4e9712cf1d5d3230ce1c46800ccff61d5a2f21092480630cc5d5c52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD561003b54f317264343c28e90ab7621b3
SHA1b1c8bd23dde35ea3b764d2e1df4ce77b12dd9c09
SHA256a7ff6f59beb33a9c6d37e292aae30a7f1bc7326fd0dfef4d973dfeb3f7b3c9b8
SHA5121563de60a4386fa4f18eb473d846f1195faa54265084c432ad29763f7c43955a81ba4870d4c0511a831e677316f3000632647a88dde917533e24d0fe61e5e881