Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
7aeb52b2f46853d7f06c6e782e76f15c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7aeb52b2f46853d7f06c6e782e76f15c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7aeb52b2f46853d7f06c6e782e76f15c_JaffaCakes118.html
-
Size
205KB
-
MD5
7aeb52b2f46853d7f06c6e782e76f15c
-
SHA1
3d2e13f1733e8edf9a26ed5351ccb6def35f806c
-
SHA256
7c9d1a10cc798e3bb3c356d1edd8eee509d0ba763201753602f3e77a93050425
-
SHA512
7b9efbfd047223e12318ddae51bcef73b8e54f5bc694a8cee3a6b5c2be6cad9f351044c9710872ea4f15a0f0349a091a2238ce29b3c6e797589e7ad7c65ada44
-
SSDEEP
3072:icHYtJ6rHfgaToXdYbduYdf73pK7BzpQK:iGoaTo47o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 2312 msedge.exe 2312 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 5112 2312 msedge.exe 83 PID 2312 wrote to memory of 5112 2312 msedge.exe 83 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1776 2312 msedge.exe 84 PID 2312 wrote to memory of 1128 2312 msedge.exe 85 PID 2312 wrote to memory of 1128 2312 msedge.exe 85 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86 PID 2312 wrote to memory of 4284 2312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7aeb52b2f46853d7f06c6e782e76f15c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16684444261608313333,1789591605736481531,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
668B
MD5ba832330d0a45874c8583404d6eb15e1
SHA173fe40cc29ef534ff231044f6fdbd9acf1564be9
SHA2561815278960f57c8e7967c29ef9237705e7ceb30b2f7ea68668a0dca3a8b04141
SHA512137301f0428422a7176e8cb1d41b381e693c0c00055b637a33fe82ac68f1e2a60af4934abed8842e805fe4a05d79225f272cd1049c28130f1192e88cfbc2bae4
-
Filesize
5KB
MD5ebcb4db8de435e1f798809f13d529a89
SHA1b5b02ca930aac70b4c56ae8e99f95aea663dfe1f
SHA256341114ad6094e29161076a1e0b3ed9e6219f1468eece618d9c9fd2d3f35da416
SHA512f1d99df8fd631bb9cdbbb883cf10a7d7aed34e290b3d0ee97ac419beaa674e18ce35b227c2809f5a91d2832b722df9d2c37eb7f3191c9b04a5c2bc3b8df66d70
-
Filesize
6KB
MD561c5b95d3ae439cb70826f32f423dd5e
SHA1efc2febcd0a8c6def9d7b0d265284ea544e3dea1
SHA25674ab834b3cfe9933613bdf2eb4ff9aee6bd744c68c4df82a82cae88d0279b9b7
SHA51288602036aa1cfc1f0b4e0ca4df852e46ac104aed4e5bf5502eef1763055c791a7a801abd64fc9a8c14a5fb4fdadb1bf0371c7d84ecaa21c0d77a1469a8d8aece
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567e977111a0eb78bf3ac42155dd06331
SHA190ac326cb68a2d9361d56ae5c5c38edf658edf9b
SHA256d26ffa38227e16d56c78ddb50cd3e134e989c4bf73680f83c755597c5363391d
SHA512068c672ba453d172461fa90d6c24844e7461cf9aa5be8c4fc1ed95cf2a5a1c0968cc760d5ec6231b72061f3d24ae05329864e8ef99007396fa6f944501f12ab5