Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
60794a8e481b9264565e1e3098052808_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
60794a8e481b9264565e1e3098052808_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60794a8e481b9264565e1e3098052808_JaffaCakes118.html
-
Size
35KB
-
MD5
60794a8e481b9264565e1e3098052808
-
SHA1
afb75d142c5d08a028cbf436c02ca4e187d08bc4
-
SHA256
93dbb69b1827d70554a00d0d9b73b72b748330a5ba4f4c1e01791bbc71f88e3f
-
SHA512
2eb527e1f5de07c4afd463d7e7e45c21092372af678ec44afdd3e87a2555787677d5deb99e00544d476498596574ebe91d420cc6d567a5c5ab78e2a93bbb76d5
-
SSDEEP
768:NSFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34ahi6781DdRA4vEOjq6h8aRlR5:oFQW81D4RA+vEOjz6raAhIaUC81DdRAA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 3972 msedge.exe 3972 msedge.exe 4588 identity_helper.exe 4588 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 388 3972 msedge.exe 83 PID 3972 wrote to memory of 388 3972 msedge.exe 83 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3448 3972 msedge.exe 84 PID 3972 wrote to memory of 3368 3972 msedge.exe 85 PID 3972 wrote to memory of 3368 3972 msedge.exe 85 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86 PID 3972 wrote to memory of 2652 3972 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\60794a8e481b9264565e1e3098052808_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11159012951451514492,13102980916868764727,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
572B
MD504c6f75b589f673aadc65113d159bde8
SHA1f90d6d2c3ec4445e3ca269014d1e4cb796f239a7
SHA256ef412fe387b90ab6508cde2ff214aab80133fcc1b36a2b593df51cdf618ad0e5
SHA512720d4fa1bdedd19315320963c0784dc9f44227306cc22e45a1ee8e7b3b2b683073b20cb0c31d06868de46997b0a333887b7b70f575b33df670e0716f66b0b1cb
-
Filesize
5KB
MD59a221112ad4607dbb3e911fe865e504f
SHA12d00f846c45f23159335111d1e089c22e905f32c
SHA256aec08c794696b2fd579c2938a640d01a1459bc8194b8c5959073880a5c61f816
SHA51221828d5cdaea15cae9eb7fced2bdfb7b25f82771da68aab396a57313bd9a1a6fc0fd79366575a4a04e8cc493108d4343c1fd6087c8e5e838e99415b7f861189f
-
Filesize
6KB
MD55114cedbcb3e0b03efc374cbfce34666
SHA1ae7b7e8ecd96f2871e49f053b5df777a8a31c47a
SHA2566a2704f2f11aaf03f573c2ace98691878b89068f378cd0b7232b3eb9378e8c50
SHA512303c035c9e46fb375ea36b80b4c8d852eb532545e9c91105bccd3cacfe7678e0d501c756d0ccb0d95b8d2f1120814a89d405e7cb71482289b9b9def4e7578c09
-
Filesize
6KB
MD555b2abff38357f21ba35c61e2557d7d5
SHA1483ead2d7d9c75ae62a4851456157a065227f0ae
SHA256cb796081ac0d5d78e78ee51473d7a7b79bb53aec05b9a1cdc68d7764abd0e667
SHA512b3575887bbf17a01dd6771086487b8237d7a15ded6af7836abf8c52fbac588ca8e5f3d62510939fdbacca62083949a450d980fb51741bcf2b91d4c5d846d3e46
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD572a2bef86709814101caf6fece41fa1e
SHA1bdaa1932a1b56dcf2c518f83fa9a8159c9796cba
SHA25635d575f5aef34c0b5739bee28350d743e8a8129f80dd8a7181b6adebe5996d6c
SHA512e550530da326498b01fa3ad0e9f14af22f57b45fcb4d19cb03da183bf9744178bef3d261742fbe06132ba10b26425e6f0d48c3673c4e012d01b152d1034fe8c7