Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
661ac4063e7d9856a6c64efa408332b5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
661ac4063e7d9856a6c64efa408332b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
661ac4063e7d9856a6c64efa408332b5_JaffaCakes118.html
-
Size
23KB
-
MD5
661ac4063e7d9856a6c64efa408332b5
-
SHA1
42e4dfa56e52630bf8694853fea66ceb9059628e
-
SHA256
0c9ce5da6aacdaa54e6dfa3927353ad9471351d0e8e1c8e7193ed902928ac7aa
-
SHA512
41d8880966424a065f6c25e87802ea09b3473259b816b0eb60693423a732cf0a1e94a21327e1eb2c61de158f5c05cba1eedc3c9ac69b85d89908b79128097af5
-
SSDEEP
192:uWfMb5nkcJnQjxn5Q/nnQieWNnjnQOkEnthJnQTbnlnQwCnQt8wMB2qnYnQ7tnOA:S6Q/LUA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 1644 msedge.exe 1644 msedge.exe 2676 identity_helper.exe 2676 identity_helper.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3392 1644 msedge.exe 83 PID 1644 wrote to memory of 3392 1644 msedge.exe 83 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 2528 1644 msedge.exe 84 PID 1644 wrote to memory of 4468 1644 msedge.exe 85 PID 1644 wrote to memory of 4468 1644 msedge.exe 85 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86 PID 1644 wrote to memory of 1748 1644 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\661ac4063e7d9856a6c64efa408332b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,425400242983034372,17954406336294673406,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD58dc24f661eaa1c5aaaa214d109f62f15
SHA175b7533f2556b61d89db7037b871a100e44cdc5c
SHA2564dff50848ab2cfa0aaf2439bc9652a9d89e2ef85967482c04b42066791e6d3bf
SHA5128d9fe09823ae5106e36fe7b86aaf6c10b2edf0be47eb20474025424cf87c4dfbf3a23c6fd4420fd733864a1afe44c147ae83f4f887bca2aedab576949ba83c76
-
Filesize
6KB
MD5c98653e2d7bf05d6b7febdad7675b2c1
SHA19a41480d349bb80b76b5033dc94e6484538c19f8
SHA256e0501232cf736e070f1ed195f89410d72ca2ef09bf02b61b1ec345cd2548ba8b
SHA512a4e4fa456e668e823c886b31663ab77355ce594a21297432c93300541fc5c95457e37ec1a1d441fcaa71a3d951625b54cc1ae4790b2d661a62d5e82850741fbb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9b3a5ffa2c176f401dd231903f82dbc
SHA1f9a856b8e2fb2e11a9df56d586f5dd31b8649f5e
SHA25650a681715959dd11ae498de9df2065d89cb167f74e426a6c7d27eb78906a650d
SHA512cc463564e65b4eb969c27e77698b18e1abd7bbf7b25391a9ce907c767eb6d88e5f31a0335664e7698015709b0c1bfda575192f75cd7f57a90da867d850bdfb53