Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
758a4dc9d187b1f3db1fdbbe3169e369_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
758a4dc9d187b1f3db1fdbbe3169e369_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
758a4dc9d187b1f3db1fdbbe3169e369_JaffaCakes118.html
-
Size
10KB
-
MD5
758a4dc9d187b1f3db1fdbbe3169e369
-
SHA1
eb7b08220361ce81368493acb9c74dd17b3bcba5
-
SHA256
cf3de29de5db1db920b4563a895c715e203038a0798c11cf3f5b1c8907947701
-
SHA512
5432f0f7c5805b0b1bf8f3b31eecc54cc3007253e5491af703f054f61e8c7b781d5509fe4bb6008e07d8d5b4e382ddb462bc0fa8f0fc60e6e1755117d58ed0cf
-
SSDEEP
192:550M53YAwesz550M57Q+hHJ7PW0CjQpyCh5U5p1aNSO5S/BgKNQNeIj2Y5t8jeyx:550M5Ijesz550M58+hHNPW0CUpyCzi/h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1104 msedge.exe 1104 msedge.exe 3716 identity_helper.exe 3716 identity_helper.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1112 1104 msedge.exe 85 PID 1104 wrote to memory of 1112 1104 msedge.exe 85 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 4508 1104 msedge.exe 86 PID 1104 wrote to memory of 1360 1104 msedge.exe 87 PID 1104 wrote to memory of 1360 1104 msedge.exe 87 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88 PID 1104 wrote to memory of 2748 1104 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\758a4dc9d187b1f3db1fdbbe3169e369_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1472,16657005257442020048,13706292590946737355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
300B
MD52c750d7ee320512fd968d5a3d29f6a3a
SHA14df62902253cfd62ead60fd5b35b6aa2ff32f198
SHA256a6a4b925018211a12e32b6326e2eecc4e766b6ab381838a873800e829fbca9f9
SHA51273ee184086a9e5156f642b60287f65c3fbe781352d19e3bbee6b23c9dda974b2ab21a1c7eea543fb91b937f91202a730c5c0dba87fb238bd3e16997c1b9814a8
-
Filesize
5KB
MD559255b1c4857adaf358c184384b56b20
SHA1fb0a57aa8c9aecd1d65c7f939215fa51e55c2888
SHA2569c8b16b0621db25ae2574697928730d39fb1550812fa157f4b0e407925d8a067
SHA512d6e6d5a4f145c4107aba1e64df639dfe8c111209550fdac61592caf6e74b90da7aa78d9e1d279d407ae3f466100065eb2daf1c610620eddd209af3ac1ea000ce
-
Filesize
6KB
MD5e6240079ee8dc82097d69b6231c91ff4
SHA18e2b2f1cecb52b4ea10e14e3f29f8d0b7af11b11
SHA2566cdf4ada3961526e7c803ab195f959a2490ff9382d2c5aa5fceb6cc55968d268
SHA512845e98f94466e5287cd545d4ccd6abce6fb6cf947536b7a90c185970ecdd6cf25e8db2bc8b30890e1be41da4826f104c991e89ca7d29511c111c10bf1e84bb23
-
Filesize
6KB
MD571f37f7ac85cc72432e4baf2c3513c14
SHA13f84500349af1d5c118309c0109e4097f95fcf27
SHA256d283b3bf8b79e5953b43a65a5e1a470ba19d332e7517a7c118f74d845649072f
SHA51228a33f505bb4b9b441be352b9ffab2bf0e05ad89597b45d712a0d15b51882303301e0b0957b2b21b0089acfa5ca1ae9f55b9409773422cba41f08b45bb0cb85e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54bbff41bb18f5fa4cb80b1b4722e1d51
SHA1d8ceeec01e9dfcd88f12e4be500b8259bf1ac9a3
SHA256c8f9514a4f9329bef25848b347711ce40edbad8507bd4e2c1da0f71e8a45f97b
SHA512fb23508491dfdbd34d9007b1db34088f9df13a3b74583a7bbcca825986d291251c9ad49a9eb50ea8fe5802b006593c9b4b53b9ffdd5af05be2230f6317f9f90b