Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
5b700a89c0556ff2e841afe429969bc2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b700a89c0556ff2e841afe429969bc2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b700a89c0556ff2e841afe429969bc2_JaffaCakes118.html
-
Size
67KB
-
MD5
5b700a89c0556ff2e841afe429969bc2
-
SHA1
7515e350403bf8e276d394529bc9bc671a3e3413
-
SHA256
efe8d8a99830d5783308ecc2cc01b04c474094f64ed3667104dcddfb2b042b2c
-
SHA512
9f670396cc3aeccdf03bcaad98052dbdca5b3e385d84d3f6752cdb8213a84b64f72f14db34a9350834e16d0eb29ab1526df543c6f1c08beca272f1b42555bb25
-
SSDEEP
768:Ji+gcMiR3sI2PDDnX0g6sQ6y5oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:J2dTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 920 msedge.exe 920 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 2880 920 msedge.exe 82 PID 920 wrote to memory of 2880 920 msedge.exe 82 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4980 920 msedge.exe 83 PID 920 wrote to memory of 4288 920 msedge.exe 84 PID 920 wrote to memory of 4288 920 msedge.exe 84 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85 PID 920 wrote to memory of 664 920 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b700a89c0556ff2e841afe429969bc2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff912ed46f8,0x7ff912ed4708,0x7ff912ed47182⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10253835333732155101,15564960066864050914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD595f52e5292b4dae50c3306e476daf7ad
SHA10a5ded6bb42ba2c4793f15b8a5f96c446cbc3e07
SHA256d504cb768249d0044e856f4cd49c7f9d486efcefcd3affd8ff5be966de26ec87
SHA512c941d175d84b37b659a9aa49782ec3d97e0ffb8b2c62ae0b790a6885bcdc7e010f34186098cb291a8da6e12afabb758af291da079d7d95f885279ffb7d3bddfd
-
Filesize
6KB
MD582ecd3e29e97f909b60df4a2495caeba
SHA1c0bd34c3fd8caaf44d5d41ad4c90a126bfc17362
SHA2565f4f76f9754bc1006ef07e9dac115d015ee6af79881e4e3cc1812ecef5ad9f92
SHA512fa1cd388c337a78259f60725eb11b90e5a814afdb6dd2cdb0c4047ec9d1a033e55338bc436122e1921fe3e39dc0aead51e7d47cf8af9fa24ea76824a709dfdda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD514b9e60cae0da26c2fd962e8bd9694cb
SHA116c8dfbc84056ebdfb5a5920e39559a7294f6b77
SHA2568eacd753f43694f4c5566cc5acf4a031f17f8ae875786f799392f82f09c5aa8e
SHA512a89b80ee7a84be362b26787ec26de567c870bebd3dc7543d51be1e8734efdc6c4be16427c57be44aef0b75567d84c93362ef615a5a919ca30c621739ef0ecaae