Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
70d261e3a4e5178474249441e512b66e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70d261e3a4e5178474249441e512b66e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70d261e3a4e5178474249441e512b66e_JaffaCakes118.html
-
Size
28KB
-
MD5
70d261e3a4e5178474249441e512b66e
-
SHA1
2a915534c04e041d20012689a79106f50bcb9dc2
-
SHA256
b42f47f796a1aeaab52bc3054e29105d028047ba1aa58960e758fc1aba344e2e
-
SHA512
46efb792e79c96e0d999872766f8a50e987de2dd0b8ffa83910ff7e51137aab9d32c56ebd79cd96f89f87d6e85651dff264d5ee48f6db365efb5a3437080e1ac
-
SSDEEP
768:CyizhaE9hnEZsBJLcumWZOTvxxBxJvL1n:CywVnJa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 3940 msedge.exe 3940 msedge.exe 3536 identity_helper.exe 3536 identity_helper.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3148 3940 msedge.exe 82 PID 3940 wrote to memory of 3148 3940 msedge.exe 82 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 2620 3940 msedge.exe 85 PID 3940 wrote to memory of 4152 3940 msedge.exe 86 PID 3940 wrote to memory of 4152 3940 msedge.exe 86 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87 PID 3940 wrote to memory of 2580 3940 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70d261e3a4e5178474249441e512b66e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f646f8,0x7ffb55f64708,0x7ffb55f647182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14329854216124713457,10226124391283328281,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD569fd134fa55fda87d0021da7177ea246
SHA1bfbdd16c61a9dd7acc0ef840ebe80616c906d9f6
SHA2565180eeed398ff976021604b82878bf03d6bfc6b2d36e3b26901d642ec02e37f9
SHA51281a78f6e3e24aadbc0c126390453b31441ec9b181e43d1f9ffc7753a2a64cdaeb0ba798a753b3262d90c252339726273e3c5149f017a1d25d5f79326b8aac853
-
Filesize
6KB
MD527bffd075661296280b8110ba845a22f
SHA11f539e0ba76f2c4663c88f45c1ab8e73cf5836f0
SHA25647cb46d67ca6006e050e48248b858c20a937b6e3a666fb39632017dcf38b184e
SHA51248582f30d4f6406b3992fb2f99b28b80230ae48eedfb5f43d317e679cc33611784e2e4ccfac335973baa737a6758406c72feeafd7b8f47d2e97cc219247dbc50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d9399591e0a17e1845072a18a1ee371a
SHA116737b3795a27f65b5f8706559afab27b54a2219
SHA256961ca83637ca1f00bd664dfc4c1c71240a4277953271497e190bbc2d7515bc8a
SHA512f2a87167c3a05a22b650caae3edad5e08c6a5115fe88bd605979de64116c13fdc2c3e2f3b27b06f5dd8178874aefd06e317ebe9b6c63f37d29c68f085e4ab297