Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
-
Size
969B
-
MD5
6f04e99a7882d6b30042ae6de22e52d0
-
SHA1
2dee9cf68c20096cd9a2cccbadcb193192e588cb
-
SHA256
80172181dae3cf122c6023e2db73fc595ff8deba81da3453e0e4fe3362282f88
-
SHA512
9b569d11a09136dc59cf7e83a2a7f5acc9968a5915cd73dffb824efce707f70691406a0f88cb6f26ea756fe15e59ef02f6bf49090ba3b2fa7852b0a69d5e3a0d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 888 msedge.exe 888 msedge.exe 3672 msedge.exe 3672 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 5128 msedge.exe 5128 msedge.exe 5128 msedge.exe 5128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3520 3672 msedge.exe 84 PID 3672 wrote to memory of 3520 3672 msedge.exe 84 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 808 3672 msedge.exe 87 PID 3672 wrote to memory of 888 3672 msedge.exe 88 PID 3672 wrote to memory of 888 3672 msedge.exe 88 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89 PID 3672 wrote to memory of 628 3672 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc5d46f8,0x7ffffc5d4708,0x7ffffc5d47182⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6252203546266489029,7783655243689779664,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD590e7aa2eb8bfe8590be9a377ef069aa2
SHA1d99cf8bb487f29cffdcd97283670d23f18688037
SHA256256d1f70da6068b907c4738ea9d743cfcf6ae5e5cc98ee89b12163294a3be07e
SHA5121302a6d75256e2c51fd19a5dfc881139e8b544e223e4119d6c122eebe15c096e91c194079c8a87a71e9aa29ddaf1d3f535b1bc6e401dc291c32f16e79b525fec
-
Filesize
6KB
MD55afbf65d57d2f5d9092dd61a8c2ab1f0
SHA1287746f2e036599a47d027f1ef87f79c5a467d3b
SHA2567c420bd3820c527e9884b5d18aab03b4feab6243bb9119ae96a59f928455385e
SHA51297795e1cb00fc81c35f8fe3f9b492b0be6c098784d5021256e35b8812f2ff8256394837b97562491a729e4bd18e8a5013d46edc149ef5464b4b1508eff7e80fe
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57981448d1630aa27b9a29bcea4f67264
SHA1278126b2f4240e6dca5fca5a662e12777a16f2a7
SHA256f5f8743e2ee2bf68d88c7c8f75a25c159fcb5bcea7d69584267bbcd2fbda7471
SHA5123568d144388ec9102ab4ab5478455eff2546a1fee729fee4ba7fa669e6606c038429640d3abd8903cbd7a2816ecec7e7f7ed2abda9d1946759b6a79947cbdf3e