Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html
-
Size
255KB
-
MD5
5d055130ebf85c6e5f512d73582a0ccb
-
SHA1
a10783a7cedebf422fac55d8da1bc8c90bc70bfa
-
SHA256
79f6c3e2b5fb6db4bae081042668705434f4c8a5e3ffe41fa0d62d373469c471
-
SHA512
95f91e1e3c22de7d3bacf548a18c75c6827bf2d7f0e7d6c24cd2503e5429136bba06ad33b56b4412b7c3a8b1e8d18e8a21faeacc1e2810390797e737609472b2
-
SSDEEP
3072:SIgRNyfkMY+BES09JXAnyrZalI+YPyfkMY+BES09JXAnyrZalI+YQ:SYsMYod+X3oI+YasMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 2004 msedge.exe 2004 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1684 2004 msedge.exe 83 PID 2004 wrote to memory of 1684 2004 msedge.exe 83 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 4244 2004 msedge.exe 84 PID 2004 wrote to memory of 1080 2004 msedge.exe 85 PID 2004 wrote to memory of 1080 2004 msedge.exe 85 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86 PID 2004 wrote to memory of 4280 2004 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d055130ebf85c6e5f512d73582a0ccb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13518714235201079982,15463593505624689101,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD573f0972356ae4737cc56f0fddd021dca
SHA1dfab2774c0e8634fb035222063b89a7566650513
SHA256e5a7840ab696a7aae245532fd0f9e875e95aceee10b09aef51ce6be7af35df1d
SHA512a2636b65e19fde6214d9048ac7fb99c9e85bfadfeaff3c18e7fd4fe7b69d242072d6f52f3ceede516d7202e376a0c19ba6787cb0795703634f968adb86f84693
-
Filesize
5KB
MD5a90937751a06fca232483eb2d6a47fc4
SHA1ca61add431533cdca2879107d6e9d30ea2fb871a
SHA2568a36c99da111f9f3aab70ba4ec1332b0af5d7e0210c4a84d5fe07ad632e1d7e1
SHA512f2e7e0006134ccf0f9f2562800847cde4d6fae23ac1910b86ed02c95a2a5eea871f650c621ad59ec2098535b248df7205e0839d400a04eb6e858ab688c7f4c26
-
Filesize
11KB
MD5b2efeb5376ef059d58793a1c4fd05517
SHA1c18a1d4c2ea773f5c1aed1b9b205a8af860993c2
SHA256a9bb9fbdb2e58084dd1c17510f3b0223d77c92062b951ab1bd2ba569a2c5794d
SHA5125f4aba39110c69e7f2af4128a3fcbc6bd4b58b1cc7643eac422c204c9139deda7b5b2b2b736d0070a970dbd04c4e7eabf1e2c2e9adff50b3cc3ffcad52a366a7