Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
5ed07978b8cdda0676ce19d74ca17eeb_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5ed07978b8cdda0676ce19d74ca17eeb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ed07978b8cdda0676ce19d74ca17eeb_JaffaCakes118.html
-
Size
19KB
-
MD5
5ed07978b8cdda0676ce19d74ca17eeb
-
SHA1
a2d5b585d20134718275d44f12ce3eec472c83eb
-
SHA256
23cf02e075cfee34e64fc555cb93454b0038a08225fac9de3f75d6e5505b2477
-
SHA512
5182754dea0b9a39b42d428be3448eb375e21fdf8dab26a3f7cd270f3f2817645dfff0e3c875c8285d85090cc65960581a956d96f72e23b8a4e87a6dba881092
-
SSDEEP
192:9K/ypUhTGziqEWQVaLTgE9d3rHiJTNIkwgOJTlMEoE+jQPZX48OpM/Fh4Hc8gOJw:4/yoTSiGLXf7IQ1fSp55OOunvi9in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1168 msedge.exe 1168 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4468 1168 msedge.exe 82 PID 1168 wrote to memory of 4468 1168 msedge.exe 82 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 3100 1168 msedge.exe 83 PID 1168 wrote to memory of 1256 1168 msedge.exe 84 PID 1168 wrote to memory of 1256 1168 msedge.exe 84 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85 PID 1168 wrote to memory of 4920 1168 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ed07978b8cdda0676ce19d74ca17eeb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7464640227376227452,12287251811023911714,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\885d5c17-ad8e-487a-8813-2e7b57e148e0.tmp
Filesize5KB
MD52b171025951fe3c0b9ae4b9b898f7a34
SHA1d3a13613bae26b496aaf762c2f485e4542f32443
SHA25602923d89ca57e970e2472df9c076f8728f391bef5a9ddca635936d81769cb50a
SHA512e3b758e1aec06f3b1eae301f5f9e7e94fc1b57ef9f41346007e54fdf23796894ba24247c630b78bcd9f688a794bcf99d20336032805a784b35f94187a46dabd0
-
Filesize
1KB
MD5ff4c6497484d922519c3482993cc7329
SHA16e10c0cdda8b7e3d7bb3a8923370bd659c6275ec
SHA2561168e9cac39e209df23743bf0c0be054428853de282a70a2fe26166fe5deb5eb
SHA512f8cbf85ce82ab09255a686d1b4211a378bea3fd93158672155ecf3084e658d685630f8e6336593e5c4d5258fc93b9c166d50bc02ea26fd1d025e3c8de5854109
-
Filesize
6KB
MD5135aa233aa07aadfc83812afd2590622
SHA10fea91944e5c9654d2bab1273b4938e7f650d261
SHA256015da293fcd5fd5c8ae40e874482d3f4b36add47c1a8c170a16cdf8911115838
SHA5120a51969f063ae6991f9f2405619d3daafd4fa26cb66fa8e0d460bc658c854611e99b4304359cc13fb86aed1f18e6da3b8b8737e8c8ee73481aca8100f95dc0b2
-
Filesize
6KB
MD5b6d91165c88ebab025d47da96984c843
SHA1280a07b2667e8f127080b27457ac0e98100b848a
SHA256100cfeeb083190cf861917f47bad63d5af666a8d5d79e57ce418e1e5c09baa9d
SHA51293471ffc41812f9f58443371485d0544e086d088b8f3cd3f52f916079cf5b51fb42696940e185d95ece7e086f18e31053a455fefa652edd0765b17d06e164371
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ede1115d12f028851b319e87659f58a9
SHA1e080fc92da40ec05932bf0524f8d043667415a15
SHA25651550826c2f0b88a3c942bb7233967ea1275765c206dc3f324b2e24fc52e70a7
SHA512c38930ba8d000c5ab343e4c3a1a73ec4072f298270dedf5a7b5b843f997f765a4a23c6efd87edfa0d8a61496cc9eac4d838d9ff7d35e2c423ee2b9379da57bfd