Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
50c21fda4385faa50b295c4ac595dd33_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50c21fda4385faa50b295c4ac595dd33_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
50c21fda4385faa50b295c4ac595dd33_JaffaCakes118.html
-
Size
36KB
-
MD5
50c21fda4385faa50b295c4ac595dd33
-
SHA1
0ff38d1a0116d462e3cf30582f8a8dc1ed2733ad
-
SHA256
6e3a63911b582cb63ea62e81e14cad57bb765f51b86aff9d376b880b22ef570a
-
SHA512
794659939b5c79c6be02cd388e4321c5740ff566e5404b89bf48f5cd4515507ae89548426933c18b8ec96cfb1315226d35f0496ed733c15d5ced411c1db72f78
-
SSDEEP
384:pEhFG2iSNqjSFlWs+MG9ot+JoWNobDfay4QTuPVI1jLFKun3DFgx:pUERuG9ot+roXfay4uLxDFgx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4544 msedge.exe 4544 msedge.exe 1684 identity_helper.exe 1684 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3012 4544 msedge.exe 83 PID 4544 wrote to memory of 3012 4544 msedge.exe 83 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4388 4544 msedge.exe 84 PID 4544 wrote to memory of 4460 4544 msedge.exe 85 PID 4544 wrote to memory of 4460 4544 msedge.exe 85 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86 PID 4544 wrote to memory of 4416 4544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50c21fda4385faa50b295c4ac595dd33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffcb7ba46f8,0x7ffcb7ba4708,0x7ffcb7ba47182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12875118116674361102,108434557897602718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1776 /prefetch:12⤵PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
182B
MD5136a8627c9f4b9e2c7d3a90d2556f6d1
SHA1a0950a4a78f7bf1a4d08fe5dc8040d25e5e7094b
SHA25606d0224a7ed0c632fe0d506783ac4be33fdfa3c3b3b4a46dcfd4bbf0a1a08ea5
SHA5122399bbaeaf845478196f713f1e78c222568650d1cddaac47ffd82d93ef2a60d1cc7e40bed100afff0101713e70373793d2608f90e75e471f849888c19c88af1d
-
Filesize
6KB
MD5dc72110e0aabc1755411e06380bc4ad8
SHA174c8f9190ca1c31dcc3d8816bbcc82d92acbf695
SHA2564ff3547ab1118f6604bbf8897832975ee51300a29f0503a943b810a3a383c9d0
SHA5121b112c325052db05332fdd1013e791f3e944a3ccb423ab645b2f7af3a1d82c16571e62c8fe98fd746d68e94cb7501144f7c5402f501e2145f003f204c9fc77bc
-
Filesize
6KB
MD59d013f570410f02605ba029810fdc5d9
SHA137ffd9255ac2d5f34d01e20710dccb5e36c720f2
SHA256cf8428251e1f7cb3e3483780bd3d02906b9e5de87dd6251faf8677a3ddbf111a
SHA5124193dba732ed13c9cee4b2cec997870f7d74a09519a732663257795b4f3b0632b69748f2a9b67f82c315f66c5de12ba0448a737f60db953b4a2c89748fd03e78
-
Filesize
5KB
MD58a169ffedc5679c4474d8f20d9787bb5
SHA1bbe53ebfd42676dcfbf552f7d7ba25f1eae0fcdf
SHA25656ea63037e077ca689812bdbb3ff21de876ac7aaeeec0ad7237b4ea976a73a10
SHA512a75cc961d9e3630dbad6ff4c71b0f6ddf5653c48f69c5408fe6a89c580eefc43f005f4eceb6d12b76287dcca6172b651de2431d7b5ca182d453118bbfdf8821b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5bf564724e1c1d23c40c190bde51f693a
SHA1e553a05eeddaf4b1f78329b54ce1e8ef60e990b0
SHA256168a1f017fcbb96491a488c10ba5eaa631d727fefaf5b30d28242b79d7d93d51
SHA5127ed7cbb6586c10b6e5afa1b73bf49a9f3faeb183face44e0faa8805b1846fe14f92d36a97d4df3cef1a46d7558296d7c79bfa882de9749ca199b02115a0f329b
-
Filesize
11KB
MD5632b0f5f717cc5e4ccf337b0925b5102
SHA1a6c76a251f61a7ecdea9d2e71513beffbdefa64e
SHA256ac86aa3964122b5d38306e41b8fb36dcea41f4a5696e50875af6c4c10f27caae
SHA5127d9569f66dbed46b5b8dd1702a1ae1a3d50673a477a31534f141f5351421cf2080cdf7d17913ef0bb04e30ae5ee9b3732e9413f58117b46d26c978f372893605