Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
-
Size
17KB
-
MD5
6113eec0783b05d0a245ef90da0b819e
-
SHA1
e1d4b49c4707cf460403bff49897f691304f2018
-
SHA256
b02618e2fdbdc67dccb858d9bd72807fbefe915082e6aa7b7a40fc6446cac1b8
-
SHA512
1e0f68f09991a64b99438f570472be26d625ccab835dd2b2eed5025e53f81e3a97fd1aee1dec180ec2c3da397bb2586da494edb7539fc81fa6d9a5a71beee27c
-
SSDEEP
192:enbv3K9Nl/7lJ1o/IE2KIGLDLEuFFq5JEzUc8bdnK57J/APIUAckUJJ36MeeTS8A:CLEuF2f15cwDQReAo/AgKqkka
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3112 msedge.exe 3112 msedge.exe 1748 identity_helper.exe 1748 identity_helper.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 940 3112 msedge.exe 83 PID 3112 wrote to memory of 940 3112 msedge.exe 83 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 2204 3112 msedge.exe 84 PID 3112 wrote to memory of 3096 3112 msedge.exe 85 PID 3112 wrote to memory of 3096 3112 msedge.exe 85 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86 PID 3112 wrote to memory of 5096 3112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6612388768693857803,4494987722466660046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD58d63a0f081d4c8cd1283723b069e8463
SHA1e51aa04860f9ca34e9b17b777272664e405f0cf0
SHA25651bf8e249ebcacb8137210ecd348cabd8c5ae4ee9fdcc236b46bbd523f394901
SHA512c03af73615863cbde59856b302875901005f148fd90fcf9db6c21a4f1c01ab7e0d48d3e7c1b36d24f5a5402a2cdd11e8d6b431aacc00d731c7315216c09a3485
-
Filesize
6KB
MD50e679bc746525ddf107c897d4f5391de
SHA19939d134f6e040645d246062fd8290e5619a488d
SHA2564535c368416b06d3eef92a8b6058b1eaf6f98e3092615edba4fa0ae9cfbb272a
SHA512c73261fb84c752708310664693df0a29dcbefd20dc3624e3bfe70f4320be45a22b3c0f8c36a0c7294bc78d2f2c19bb14bd4853df5fe0071e1df77db58a0e9875
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56bdcd8fd778cfb1f880c8e5329b8b6ca
SHA174c309e05480afcd2d12aba346147b89aa98553c
SHA256205609259657202d991b1d8f0468e2e0584209fb2aa7daf27659e1514f753f80
SHA5124803c6772ecb2e4d62c79ffe803f85698659374e9090b3346dd6c51ca4220f6ed7bc7e3b4a24dd7bcc0ecc5fde50d2ac653384dd6b32156a4e9543543b6593bd