Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
50e932644be05685607306162f0cceac_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50e932644be05685607306162f0cceac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
50e932644be05685607306162f0cceac_JaffaCakes118.html
-
Size
20KB
-
MD5
50e932644be05685607306162f0cceac
-
SHA1
96b90efcfbdaeee5b7fedd4442e9539c35c1c441
-
SHA256
57ff40daa5cd238b124218ccfc35b70cde86b0219bcd33116cb7b8bc750838f7
-
SHA512
03273562b49cf56d333d5de9085c7dd7864e66a5a144c1ff040222756d47a111390427fc7ab0d75508021a875d0cdcc082ba2a64606ba0a817f00fae5b418f5c
-
SSDEEP
384:SIffb96ARRMZxweay3IZWhN5cCcJ52drPzWhNcT1CO2L:SQfbYARixay3uWrr7WCWL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3568 msedge.exe 3568 msedge.exe 1592 identity_helper.exe 1592 identity_helper.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2612 3568 msedge.exe 84 PID 3568 wrote to memory of 2612 3568 msedge.exe 84 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 2252 3568 msedge.exe 85 PID 3568 wrote to memory of 3652 3568 msedge.exe 86 PID 3568 wrote to memory of 3652 3568 msedge.exe 86 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87 PID 3568 wrote to memory of 3312 3568 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50e932644be05685607306162f0cceac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da47182⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6503439558033777082,7051047698402892627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1c943edd-dc75-4920-8d71-a982305f51f9.tmp
Filesize5KB
MD540ff027f20439e60c4ae219264fa1c5c
SHA1658eef96dae2a60d47e94c27e8fd8805c35de6d6
SHA2568c9d15d6b9ef8d6166f27bc6ed69b2282c261766f96068734e14d2dd7fe0caa4
SHA512116c0f850b173b2a1f691fbf0f3f66517d22ed63fbed48a90d4938d1fded7b2c34c188d8f0d8ca2a7bc5a42a192975e095b0c677c0f1da3ebe7dccab679d8b9b
-
Filesize
470B
MD5d5f319b3047371c00cc3dbdac8e282b4
SHA1232c53fb973120b7298f478b93c2ec2c6a2ac7b2
SHA256e8e0a839344c517fc889c0a2a08e19ad7ad5ba4c8c6a67faf08eb03126b066da
SHA512df1719cfc77228e432fd138e4c504943b3f6719a64dc9618600c302d9cb981e563873c4d7c6f1370b89576e1b54fe2c76679c48de55bb76494a611530fa029d1
-
Filesize
470B
MD50e64efd898cc6c476ca8da4ebaa57622
SHA1d58cd632832ed00b695d7343443519b84d73eb26
SHA256b127b94e7453ab630ed2c0dccf86c1e82709fd1cc709bafe81738c2358c3414e
SHA5125b843d78ad92b1152014c9b2757658cbc61ee42e421b730e0d187b185b3f1346f8ccff3df208c9421b5f4e7cbb73a82e498a0762ef66d2437d08bbc306861c8e
-
Filesize
6KB
MD54548d768f94b6eb5723167bf921e4388
SHA12e9a14ced3545281febf36de50a6a0054d5366d2
SHA256978de59856afbf9b96bd29e3ca9b7fd54b119c5cb91ec2c5dc11b09a6f97d5d5
SHA512ee85352bc285fff599d0de1289ddd8d62c59fc02d3c6259e2f5bcd970efb7af2e560ae84c02c600909b0d156330252a85247f77b71021d741324a733c8b03bc7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5db433321d57048e8b8d2dae3919cf097
SHA1acf5c54d893e701d277118161861f4ba9d1e1b57
SHA256acd2ebfd3876330cbdb1215cdd072b836cb3677113e46f700c1cc2327e59e13d
SHA512055109aff87c6017f46ad87b083af83f50b25666637610e32da1b4cfb7c2caee78359bcac70dab1e0ac6105e35ab203503024053ca08fad62c54417eaa52302a