Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
6e300b637d7fae4789516601b7cc4b8a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e300b637d7fae4789516601b7cc4b8a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6e300b637d7fae4789516601b7cc4b8a_JaffaCakes118.html
-
Size
256KB
-
MD5
6e300b637d7fae4789516601b7cc4b8a
-
SHA1
55e2c7cb2a5b288801ec5a3cea6457740a9c83dc
-
SHA256
67efb74b9761478b99a2df53330ef0a9b2a690a2ab98cd46af209d43cda967ab
-
SHA512
bf4458dfd0ed2174db83c1b8c9b56101386674f101aade066f0c7f3e9713fc7203dc5a5f6938741280ff7f52228204f12f84757e5b197f4dc945904c19f54aa7
-
SSDEEP
6144:OURjW3YHMuCTtVc0p00Ryk3e3wF07npdHrvLeaJ//kPh9DJCO:fjW3YHMuCTtVc0p00Ryk3e3wF07npdLC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 4148 msedge.exe 4148 msedge.exe 2444 identity_helper.exe 2444 identity_helper.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1628 4148 msedge.exe 82 PID 4148 wrote to memory of 1628 4148 msedge.exe 82 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 5040 4148 msedge.exe 84 PID 4148 wrote to memory of 5040 4148 msedge.exe 84 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85 PID 4148 wrote to memory of 3136 4148 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6e300b637d7fae4789516601b7cc4b8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092d46f8,0x7ffd092d4708,0x7ffd092d47182⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10870500900656195936,2813632764467042200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
328B
MD55403efef5824402c73185cb1368bd023
SHA15cdbf969c345ca24ee3a03abb75c7fde44eb44ae
SHA25697c1db938eeed0f7bd2fe95b6e958c137197a5472743bc039f42ef8947808b69
SHA51244939fd9789abf862bd100815f9f464bb50a24e9339c425adbcf9af12b83333fb69887705531d879aef64223b6fc05870847e4a89effb33a45166283545202a5
-
Filesize
5KB
MD525f500011c565d7532b13b3e6df0895d
SHA169db5e18dc79c843050d91c45bca1387594616fb
SHA25644c211dcb7a7a10ed24e2ce17633ffd469314c139bc2a2d2ba8a91d949c6681d
SHA512cd08c5066c4eaae32b129d0362d64f6fac554ca0297c3797905abd2c53ef63dfb03d7b9d0d8f2495dead3663e21d11a84ee82c4b117593af468415ccffd17adf
-
Filesize
6KB
MD5f746fb9fd98a2d79f39686d4c00edb91
SHA1fbddf8f07155c4bb8bb028cdf5d0f3f8e1757bdb
SHA2566ab99c9559ae4bb5eeab6fba51c3b51672817991dc37363d9d5ff5fe97bdf968
SHA51291081695aedd4c20c9ad6819f148f591e3fceb8928fbdacbb1b97bde61157a43ba19e82643d696549739d4972b52a52125943e0335dd6ea921fe8d4d55ba7b00
-
Filesize
6KB
MD5bd0815d6f29a96aeb0565a06855e6770
SHA1406eeb04df7b34864e267473c819ca60775318cd
SHA25622db5a16998a14b973d49bea713f25fdfaad194b9000ee32adea36007e31278c
SHA5123ed896e2fda4bd1ee5cfb1feeb98da0115a99a94165473f4ef2c9168985cecc050a5a1215cb2a686f4c35cdd1fd64e72a187d71dead66f7a07d157d3517e69b1
-
Filesize
1KB
MD56d1d0d22eca3cb9a5a3abdedd086c793
SHA19b6f4bde77f7f2bdb2cba615f4f458454ed73ae8
SHA2564e9a44ad58de8a1f0737f096a0948b6b8f744c297b53d8fedb71d11ae7577505
SHA512195f9c4a74bb1fd27bb0e51779f9b8402c1b6e7fe07ef248f54dcef4009546c81f76343dfa232a49356dcb7488a89baa1b777432acc92d9471b85bee7a6a60ea
-
Filesize
708B
MD507061b286d454b2c6942c107d9ccd599
SHA178b0fc4f493f6ffb863477ba71a8d149f46a3aab
SHA2560a3ffc18bf99c7a81d29a7e0d64fec1ed38bc531b3ed9de60e88baa3f5935b85
SHA512a10c80d83a5d992cd60a5bee126d1ee4217f1245fa6c0f1b057fda4c0c21d478a98170bd0db6064b9b37af5d476a06e06c37e5f59aa299eec578508551e2f439
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f6073589b3d9e2dd8d05219cf41ed22d
SHA1377aaf226ea7e5d1e450bda7390cb1f2513174ba
SHA2561d22359b1d42a8420070fa61eacb4660c57aab538db404d89c40615bbc308b18
SHA5122f61104b3eba9a18811b094c8e51e7eecf734d3ac2060677add8a084ae7650a7936bb9bc42a2fd77291ff17377eba739e6ff18011196848d69411aa6a947df56