Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
65706430d478a78c93edb71198eeb8b0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65706430d478a78c93edb71198eeb8b0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65706430d478a78c93edb71198eeb8b0_JaffaCakes118.html
-
Size
45KB
-
MD5
65706430d478a78c93edb71198eeb8b0
-
SHA1
37ed6960cc16fa0d3fe9018ac5d5c8958345e9ae
-
SHA256
ef62a402b019f182c8241762a1249507c00b9f360f7e1185df795e72372f014d
-
SHA512
f79fc48461d378baf714ce90f634d3f67902b3c79e7a5a94cd5dd4024bf9f69090eb038b75188976ac1afd1a887202147c5628f01cee75e767339b0063bddcb3
-
SSDEEP
768:9v46xQAOHP8n2+YowVtICByVl7tp2MJ7+cGdldM1v8uGrUSM:9v4CQ1CCBcl7tFJ7+cBSM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4552 msedge.exe 4552 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4552 wrote to memory of 1340 4552 msedge.exe 82 PID 4552 wrote to memory of 1340 4552 msedge.exe 82 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 3220 4552 msedge.exe 83 PID 4552 wrote to memory of 4312 4552 msedge.exe 84 PID 4552 wrote to memory of 4312 4552 msedge.exe 84 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85 PID 4552 wrote to memory of 2132 4552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65706430d478a78c93edb71198eeb8b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc074f46f8,0x7ffc074f4708,0x7ffc074f47182⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,18014705745836490653,7280800114330988196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
668B
MD552d5b325fd2e150b00679e472c3d8a15
SHA1ffa582927d9e13b80c207e01c53c64966d20a212
SHA256946cca1516a6438c7674737a66a4d2b811d909803607047a113bd5427c92d22b
SHA51224f5989c3a689e37b2b34ef8c8fe6a456c5789f0432ab3875fe1262a48511758df83e72ba847db37e26c8fdb9ce429a35db69240d1458f4c08af6ca1e39bd162
-
Filesize
5KB
MD58ce150880afc08470135ecaea5b622a1
SHA1ae934a2276d9122a92b30df281641127dc1c36df
SHA256b91fa072f70d7212c80c1399ad0d517d68a58a6c6fe71ecc6ca4be64fa669104
SHA5124671a75dea253c10157d1e8976f18024438acf38ef809faeb3ea6e1a2a1a41837da5fa0b750c1e0ad4065a7188e7426945d64d46514d02db1519e8e187b35e19
-
Filesize
6KB
MD5d5c93f3683bd42046aa4f82eeedf3352
SHA150a28efd65c767aa4467ef70b143f012d7af0c99
SHA2569db03b05e3afe45a356b8e5ba9520fd788d0801e76e2365ebd916f8946981e5b
SHA51295f8b5bbfd5f8d8022b6e08f6d8b4ea406de07c62a35910491f37a7b5b6c995f3603d322e7340f6e39be7c8c6071811064cdba69bb975d65bc0f5011bdb9e9b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51fdb19013282594e2ff0614cfd246014
SHA1faf082fab61293b18b1ce83768ff0fd7a91a5768
SHA256dcbdeaa842706493b7b737c394001a331326a72b5838203a4c45041506c9b57e
SHA512595325b09466dba5515715a24ec69d0ef548052f3ac7c0de5314cf05e7a10df6e4252eac6fb4b43c0993127ccef450d28d33d31fccdfd1c52e39f67d8bb4083b