Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
-
Size
68KB
-
MD5
747d4e41c2d54089d3a0a98035e19a21
-
SHA1
7f8cd603ebef41f8bf6ce2bd9f397b6077387dca
-
SHA256
5da48088119db7e623881f19c0f2a77a550db9bf14f6c405a509448d8427b1a4
-
SHA512
6dd33ae9c6da61fe5f614bd5d11ac3ca875577edcf22e9a1a31d27e933d72364de076e66e0789df42aeba50898efd38073def9d71207f1f575f1054fe7de08a7
-
SSDEEP
768:JiFgcMiR3sI2PDDnX0g6WkaACrrjoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3m5Crr8TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1160 msedge.exe 1160 msedge.exe 4268 identity_helper.exe 4268 identity_helper.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 3376 1160 msedge.exe 82 PID 1160 wrote to memory of 3376 1160 msedge.exe 82 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 216 1160 msedge.exe 83 PID 1160 wrote to memory of 1164 1160 msedge.exe 84 PID 1160 wrote to memory of 1164 1160 msedge.exe 84 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85 PID 1160 wrote to memory of 2636 1160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10013125995788692754,12917846557990599662,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5ed485fb99e7898981d26d5a4c016d4ff
SHA186ad7d997a876154035052669d9349797e0eab02
SHA25696ceae999a492d05b81efbc1310369a7e27bccf73e808b77a4659957cfca3d3b
SHA512ae365b0cab1b8de1bfef56ae78208a20ec788d3c899842f840a665c70555abb21a6e0a582eeb4379f6d6365c7d646972a7deb79210cfbf8f57dce53bfff8b565
-
Filesize
5KB
MD5937c72d1fce44942d38f108c4e848d3a
SHA10e1469f43696e1b9e3337ee1b76dfac40fd426d3
SHA2564193a6c9a88de6ea31bcb8d770e2b1dd9164201540be6fcd70c354f6c15d4aa9
SHA512a408aed3c9643bee96788f8f99d33bca98945dea07d169fa07c8ef13cfbe4f15bc5d991f27a3c5e0f56835df8389ef843a865b001649916eed173412ef41ccdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD561d7a0372d188d269859189d0fa5c1e4
SHA1923734531a9ce32eb88fbc4dbd6de37844d21f17
SHA256cffcf775f80926418ff48078894b3693babaaad40964b7429aa003f56da55526
SHA5124d01251e1a4068518d1ea03e0e81bb7a7586428b009ea8e2a5c3d6ccde20314ff91dbeb6d119e1d21ce1a3ae396adb9db29d2614330239e6ddafba2c741cb039