Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
50eba3abdd67d66f95c7217be4e35997_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50eba3abdd67d66f95c7217be4e35997_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
50eba3abdd67d66f95c7217be4e35997_JaffaCakes118.html
-
Size
28KB
-
MD5
50eba3abdd67d66f95c7217be4e35997
-
SHA1
92a597fa15fd363b361891286e103b8345f92b98
-
SHA256
b021123e2c6ec91f442348e052bb8c9e85f44b2879be12a11b605597ce74414e
-
SHA512
88f0df220f437b69dcf3cf1e1cd3b7632b8e1b7166c4904390b7a2fc5f672adfaa5b4560c8cfc6ed76121feec528be7fa3525a26a44446c59bfedd688710b2c7
-
SSDEEP
192:8IcgMVRKcE8QRHYsE/uhfGhzcVuP+yMt3QwC1+MxS3Nn5XuXnh2F8+DGFikmXGQE:8IARKhfWzqt3Q9ZWn5Xu32bG9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4284 msedge.exe 4284 msedge.exe 4140 identity_helper.exe 4140 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 208 4284 msedge.exe 84 PID 4284 wrote to memory of 208 4284 msedge.exe 84 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 2892 4284 msedge.exe 85 PID 4284 wrote to memory of 4544 4284 msedge.exe 86 PID 4284 wrote to memory of 4544 4284 msedge.exe 86 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87 PID 4284 wrote to memory of 2344 4284 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50eba3abdd67d66f95c7217be4e35997_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,10640681139501443138,3775278889782931964,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5c415f1d557d504f15b0bb07376d3354b
SHA1051e960a5e4588ffbed2b611ddd33854869e0e95
SHA256766bb57fa000a6a4bba43140cc0298e474387dfbf84cb580ce78b5661e56a2be
SHA5126fcdf72634aea34979f9ca67928a1142df4abd3fbc8954f236a0c8bddedb94c8f7904f94cff61ca9d13b288cee799547eca98e60722faf48779703fae3c1e4f2
-
Filesize
6KB
MD57db11195647559423e2b51ce0b1e399a
SHA12f943815e925c090dd2bddbc5b3873db48d29f07
SHA256340b7e7cf0db26ea2b8d196492dcf59cbcd767600319e218c015ab0423023e4a
SHA5124f7859aecf3d726a1c103c30948e1d0b93554d5a2286544a78a684d6efdf4db5b628bf537253fe903ebf83f96b71a8e9b23a8fb74c26526db7fb39d8b9fe6000
-
Filesize
6KB
MD52f45f3aa5c1c9331c374d2d7fa9ba106
SHA1efd317e4a61645e295798b360a956bea050fbc16
SHA256b50c12245c3b9ab145c4a9fc2dfa9f95e3d3570d9cab8e14d6b297fdad73b376
SHA512d28614cab3956147760b57bfa41257a5423a43926aa5b900cb85601154dff6df93cd4bbc72add105e4c9019a86b3346e50fbe24f341b631f1e4c5cef78ee4a77
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d3f563e3a2d0840ca6fda18c9ef5ba5a
SHA14b89b2aee4680cf36e4cc78b328bd606df24d565
SHA2566a8d58693899aba687c1f2f1f358ec782dd5fff384452a79fce6d6404bd8bc6d
SHA5122c4a2fa8f20ccdded74ab77f4178d7e0773499a3bf579c8bcb9932e502d3f8c08c2dc737a2cb0a7f1a55292fb716a21e8900a0d2e6985ef2f1be62adcd7a602b