Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
4c91356dc0487caeec4998e13b540a59_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4c91356dc0487caeec4998e13b540a59_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c91356dc0487caeec4998e13b540a59_JaffaCakes118.html
-
Size
33KB
-
MD5
4c91356dc0487caeec4998e13b540a59
-
SHA1
272b6125204bc72d981e8cbb7059f1fca6d20816
-
SHA256
5028da555c59fc9963e8ce952e83385ee2ead7cb12ee47a1afcefb5fa45cb001
-
SHA512
f955e10255c1173c144eb355adcc4c0dbf24199dd20a934287608243d8c563081a35ce0654ea52eca12e453d864c07265df0eccb3e5e1485bcdda5bf5247f56e
-
SSDEEP
192:uWz67b5ncpnQjxn5Q/nnQieGNnBnQOkEntlZnQTbnpnQPMCUAFkrb2nxvFtmeC+r:8Q/Z+/gxvFwcVC4kFZUUzCBVp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1508 msedge.exe 1508 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1380 1508 msedge.exe 82 PID 1508 wrote to memory of 1380 1508 msedge.exe 82 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 3224 1508 msedge.exe 83 PID 1508 wrote to memory of 1644 1508 msedge.exe 84 PID 1508 wrote to memory of 1644 1508 msedge.exe 84 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85 PID 1508 wrote to memory of 4212 1508 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c91356dc0487caeec4998e13b540a59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1ff746f8,0x7ffe1ff74708,0x7ffe1ff747182⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6705313032028329635,2092887744631272532,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5352aeaca7c600aba942e57940bb51059
SHA1b936a1afef56872ace7abe06278041b7f9aeb948
SHA2561142f7ab716b6f2c3959cf79569bc6c707ad73f30d62d08786f6c563afd2fb58
SHA512ba5e1896804df1a9522a1d036eccb7986b40d46cc39c9ae54c4668b8144c1318252bbbb23caf0e6c83403a21956087f1953ef4a044acff55bf02f9f4dd58bae1
-
Filesize
6KB
MD57df291f2683b9547483632e8578747c9
SHA10a8e8a36af31eabba984c8369f7cfb6350438334
SHA2568e3bf0147a4cf0c9ff982f91f85b1f59565e98bf0c35c0ebff44047b5ed9084c
SHA5128da2c207bbfa68434f59146be9553e1b65d753b6c2032aebfc33443e958147775277f9e9c8c7e4675959c57483e678199270b58b20b33c96616d7eac596fa0c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD522ccabd3d089a064ced0e7527979219b
SHA18069d7778365737f19d8d2b48bc7f7d2204d138d
SHA256bf633913de7ef754487ad2bdea960ef7f41e53a7793b0ac410a360fe45a4eeef
SHA51284b991f632eefae9dcb5c3694ba6fdbccd6e87bbf2f9653554489e708a5e4253620ece8771cb5606afb2e29557bfccb190569106cba7e53aec3b21035d0b2cfb