Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
6bf239ff107b65b3eab2b0ed486222cf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bf239ff107b65b3eab2b0ed486222cf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6bf239ff107b65b3eab2b0ed486222cf_JaffaCakes118.html
-
Size
23KB
-
MD5
6bf239ff107b65b3eab2b0ed486222cf
-
SHA1
ef7b05025097a323a98c6ee38dfaee543685a21a
-
SHA256
823c7bb24374becd2cab40ac438ee8b768977ed95e1fa916543ffd1acd26c7ad
-
SHA512
d323834741743fd57acdf5f9bbb51bf999ac7d7fac82af9f169bae3d1cafe80b8402c157cb4956059f5962e8bbdbb44b71fa52cc210773de2f14fe1b2e58fec4
-
SSDEEP
192:uWfQb5nl+nQjxn5Q/EnQie3NnPnQOkEntMqnQTbnBnQlCnQtHwMBXqnYnQ7tnEYd:wQ/xBu3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1448 msedge.exe 1448 msedge.exe 1652 identity_helper.exe 1652 identity_helper.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 5108 1448 msedge.exe 83 PID 1448 wrote to memory of 5108 1448 msedge.exe 83 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1160 1448 msedge.exe 84 PID 1448 wrote to memory of 1196 1448 msedge.exe 85 PID 1448 wrote to memory of 1196 1448 msedge.exe 85 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86 PID 1448 wrote to memory of 2328 1448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6bf239ff107b65b3eab2b0ed486222cf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2538829788574551017,17133894728487824431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD50b589d6a0c3fec53b1e04eefb3b2ad4d
SHA17c68c028ad5b547feb0cfc136ba2cb736a2fee22
SHA2568cdffa71a2e4acff60ebbee090a2bc53445d282c9d6fdaf0d49ab6af8b61e3aa
SHA51297769b8ed13eb9aa9014c623ba0e864d36a2125f4903816f2f618dcdf7db84447e5ba4dfbe53f5f6bdc80ab0b8a5be818c8be7f8286102e82134de76219f983e
-
Filesize
6KB
MD55fdb86e6786b689a0a20abad3e1a0078
SHA14e2d5b72d46efcde39a38a8c85a8e4635dcf6fe9
SHA256988c6ae0432c7f3ced15a5fc8eb546a445937d3d2f9825b8b2ee8fb18b2904a9
SHA512e10ee146ff3898f45f5fdaa28b25305a1d87039e48522ee3459f2a2806b1afa908b0152bf40aa732763753f21350146858e3b0a8f13d230dd207f07933c6e6de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d6bf30e1-7954-42ca-9d8e-28af402caef3.tmp
Filesize5KB
MD5e192a2978f55aeb0d4770bf1dfde2c96
SHA1caeff14c3fe3a44ce09dc06bc105001adbd9de16
SHA256f97d1305ca0674be4381c5b80e91f6864aef6cdd57922ba507a782ef57da3961
SHA512d20f701d1b186a1f8251a95bae9b005f1e161ecfc1fdd1b8aff8ae6a961dcb7942f9047db59e9315cd02afb1b5a2d09162cf782612696ec4fbc65a78295e65b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c3831a485594b8187a24f50ce37568ce
SHA1970e01e29ea665fe6f76ba0b268194eb7a198267
SHA2568db6b5fe29d17d0a093ee366e7af5f0a740355086e974a98b65e2a9b5fc5f8ec
SHA512e65511cffe155ab27492e8ab24c98cf258b8a75d04d7993438bb1142ca92dc369e36b31c3960c3acec0f93299be39bfd60a7397795c40315e32837829656a51d