Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
61adc640290ea244f92113b4110b1344_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
61adc640290ea244f92113b4110b1344_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61adc640290ea244f92113b4110b1344_JaffaCakes118.html
-
Size
4KB
-
MD5
61adc640290ea244f92113b4110b1344
-
SHA1
dd38c102cc79f4a75de9d22625b3db206f8313c9
-
SHA256
e91e7246d3d10a8212d654f537fbae0e5fc17b82be18dbaa95e9b06fded17b68
-
SHA512
2b667a251b3e952d9df911696fe9f6ebb168b5e0ff0e8942d57317c3fab83ff6bf2775fd450761b8c5a6121844175dcd6bedaea6edce6532f22a4e82ddfa4d3c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oNy7n9Qd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 2124 msedge.exe 2124 msedge.exe 4912 identity_helper.exe 4912 identity_helper.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3460 2124 msedge.exe 83 PID 2124 wrote to memory of 3460 2124 msedge.exe 83 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3284 2124 msedge.exe 84 PID 2124 wrote to memory of 3704 2124 msedge.exe 85 PID 2124 wrote to memory of 3704 2124 msedge.exe 85 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86 PID 2124 wrote to memory of 4532 2124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61adc640290ea244f92113b4110b1344_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,16665418596549647666,15546383847748127230,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
292B
MD5183f04d09e9693504d89d140e400bde4
SHA1bf492569a2253ae2916aaed7fc0909100720858e
SHA25604483aa8be7581cf5318512f68fb910603b0657e6f8d8ad34baa3b1016ad7e03
SHA5128f180e6e3dca5ddd6575b97ef0efa4921b87fb8d4282bbbc7dee7af45dc6bb3b5009819b4c386a61407d5f25af16bdd35633f39bbefb0c579560d0ccc27fd040
-
Filesize
6KB
MD59e7260f8042a1405b36916c05c280fcd
SHA14807d94a2184464defb0eb4ad540404a65a13781
SHA25670d607adb204268cee6b12d0e39e98d88de30c5104c941ea15ad5bf11cbd1720
SHA512d99012c324b7d9800f74b282093120fba203c238e955ac3920eea7f4805865e3d6c20ec399a12ea44e6d709245fa0c579a82b8202c1a1a85a9ef8f270ba96ede
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e713cdfd-c2c2-472f-a4da-6ea7eeb88d20.tmp
Filesize5KB
MD5f3db78255fb8f3625dd91e7696f91e2d
SHA19a2c6c0cf18c032e7bb167849990d2c6a1228ef5
SHA256ebba3802256a5e0d377f4cfc22590923c199f4cf93e8d26fe4c39ccdc7b58be4
SHA512744ec6f037f76b5cc266edde0d1d91bba177b270255637c7bd638d43a87411a89495eb1e0855811469a587672341d99f18ba8ff7e1ef44ca80a3ce6e7a721fad
-
Filesize
11KB
MD5b72d39dfb939222c7d9d6c0981736066
SHA1ab7c7a71de34b9c0508e51bf525b15ffcc173c05
SHA25658bf2b267a39987f243a05fddcc772192e3a0b5a272be7badc8d71f0d21c791c
SHA5127771247af0a94f09273a2ef13b7da447bfc04221b95e2a226ef179421c63cee89e1aa873bf3c8d2a8415e7224af9292c53dd65b3ded54612fbbbd6a55fd228d8