Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
74e26cff822cb492ebaf9301b9ae01ad_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
74e26cff822cb492ebaf9301b9ae01ad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74e26cff822cb492ebaf9301b9ae01ad_JaffaCakes118.html
-
Size
36KB
-
MD5
74e26cff822cb492ebaf9301b9ae01ad
-
SHA1
e8ad163503306f57ef67c9eb5eb9e287b4246872
-
SHA256
9b33d33c60acb3f1095ae804d4b0740aeebdefaeb79ebf7184a2e0a9d5823e8c
-
SHA512
bf323369f46ca95b2c8cf112aa2e69b93939f2013102833c7438df6ef042e008811b67665a0c5fca15af4811d3b1a62a7faee6144a8d227974a6155c9ce1a5d9
-
SSDEEP
768:zwx/MDTHnf88hARkZPXrE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TbiD6eGx6OxJy63:Q/TbJxNVdu6SQ/C8tK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 4664 msedge.exe 4664 msedge.exe 2052 identity_helper.exe 2052 identity_helper.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 2132 4664 msedge.exe 82 PID 4664 wrote to memory of 2132 4664 msedge.exe 82 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 1372 4664 msedge.exe 83 PID 4664 wrote to memory of 2248 4664 msedge.exe 84 PID 4664 wrote to memory of 2248 4664 msedge.exe 84 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85 PID 4664 wrote to memory of 3800 4664 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74e26cff822cb492ebaf9301b9ae01ad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11712711947179617047,9636575724537580102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
613B
MD56b0a96797786892b0cac2da015c5fa4f
SHA1ccb65996f4d9c38bb34b624cf0a2ad21bdb309c0
SHA2561d0888a880478e5b32f4063fb970ce15ebffce2a2029449a668fd73cba71f528
SHA5123cfb95f5260e27cce4864fab9f427fd132a43c91f6b118a9c9ed32040cf280da12049bd40cccce5352a0c89e093a98afe06badc0b298d150ee6fa9ff2a046695
-
Filesize
5KB
MD580317a48ef2c3cd8346bb5ad9577c69f
SHA1042f6372b9cd685ac33daf8400b454a57286b486
SHA256e75eb3b649a3ba925997650b86cde0a3a86b7546da150e1084985fdccb198103
SHA512456e74948846e5cdba0ae7c5a0935d7b50e51647d0c021dc3e302cf7039d0a84867febb24e3c769d84d89020b5f4768d575d05577982a3edce055cc705689c38
-
Filesize
6KB
MD5b041e1d3241ab526db2cc285d60e1a42
SHA12ceb2e6d63a524f3a6ce69fa548377709f725bad
SHA256d75b33666e733443cddfdebf9aaede52db3e1df43d006e18aa52cf76d4612d99
SHA512f56159ee49ecdf2e6d52b6e0df4a2f3846921ab8349f00dc4809ef929893f0601d60e8155c1bf81494cede6ea5697d75e43059ef3846515a4440f90e149085b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5029bf49b11ecbbde0c24461ec840f8c4
SHA1f384a6615142b4381a55da8ddb718ebae6a01e7f
SHA256937adeca9496ae36db5fb48de73fe59c168ff9aa85aafbc387eae84923a9cdfd
SHA512271564943279a86d685b7d0ffa4777d7e7ba6334a36e51f1d72cc5cf2f53d1906916be0506a392de29890c8fee426d5ed136f1686c95e0b08fc0105274601f89