Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
7273b81b4a1d1197cf5078e894433dbc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7273b81b4a1d1197cf5078e894433dbc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7273b81b4a1d1197cf5078e894433dbc_JaffaCakes118.html
-
Size
502KB
-
MD5
7273b81b4a1d1197cf5078e894433dbc
-
SHA1
9fe00abb72e7c94a2c9ada8c8eb9dcd9bbd3233b
-
SHA256
e1ac8a2344e94cfcfc959d8d01719cf809e05df3aace8a0d14e1bfae046311ea
-
SHA512
bdcc6ab9a829c4f988e1eddd95865e65258cde2004635015507fa7a3ab93f95f7a69f5bde8f123b7de2d548ee57952e024a95c4820a6b993c40bac70c0922211
-
SSDEEP
12288:GLxueBb9ZtfpUEFaJEt4rYgzqupUkjsbkO1c/ZI:KrtfopA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 5020 msedge.exe 5020 msedge.exe 2500 identity_helper.exe 2500 identity_helper.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1792 5020 msedge.exe 82 PID 5020 wrote to memory of 1792 5020 msedge.exe 82 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 3864 5020 msedge.exe 83 PID 5020 wrote to memory of 4212 5020 msedge.exe 84 PID 5020 wrote to memory of 4212 5020 msedge.exe 84 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85 PID 5020 wrote to memory of 748 5020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7273b81b4a1d1197cf5078e894433dbc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6ed746f8,0x7ffe6ed74708,0x7ffe6ed747182⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,11987458851427707915,4978355850587986655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
326B
MD51aac375b60827b9859d42965b9701704
SHA19147ba7c2472942aadc3808fa6e108fd02db0161
SHA2564458d711bd3329b93eef1f32fd1d8dc86b204d0dc4d25e298c84a9d4029f4645
SHA512f1252f9318554833230d72fea3a846693f025c5c75b4bca736f092c0106348c86f37c6bca3085fc8dcb4eaf74baeda59952e415f255820d70a8764030b2795d4
-
Filesize
6KB
MD5f5b49dc747f09ebf47f416f70b7f56bb
SHA1e971c45eb8d3da80ae7ad8a665bad4662cf71148
SHA256ca1e30157d484ed422cfbca33476413fda7ca12c0ba0b0d2355e0e381aa937aa
SHA512e3d6b528d489b6f02df351122fc10e0442ada9da5900cf73b28dc4add6994c6add47c2ab1b1e5e37ebb7811462563c3f38d32385a881ea74e9aabb1b7b76f1c1
-
Filesize
5KB
MD591d056b80f405a411d40ce858b6d3033
SHA1d535668e7a59dbbfc316dd08f227d4fabb9ec547
SHA256fe1cc1f66447d512608ee60994f8824fce5b5874ec63f53c3a589e7433156226
SHA512816e535ea1be16cead45f153b74c7547a0800b2dbcabdff4d3c5e2d5efef57f1ca1271f78f49dad590cdc6d7140b1ef4ada3c7958d8b8afc29ac14ed6a9e36ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c61b7d0d4a354fe40a30880cf0bf9010
SHA1770bc3b996b4d4dcc9ebb1110531e4a06f3c4d8b
SHA25633795d8daf67683c4aee7f413b4754b9604c80ca1f6e32682b8904eb0cf0fe84
SHA512a125857579a34b1e9557af4ad13f2134740af0bd28fb1527b7133c7e955c882466841d7a89edd48062504057ad7e44d182bd418570172b3f1715a50f7ea9042b