Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
782ac603d5991d42afdefb65779b3562_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
782ac603d5991d42afdefb65779b3562_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
782ac603d5991d42afdefb65779b3562_JaffaCakes118.html
-
Size
45KB
-
MD5
782ac603d5991d42afdefb65779b3562
-
SHA1
5994808dce046c1c971b27694246f8ce11e732ee
-
SHA256
c280a5d8c834c56ba8a2c608ebe1ff4f4ff6b2d59bf2d003f32ce9429fdd1386
-
SHA512
d7f5f8e6a3b0cf2d57d6c0a1329537c52b58a79f72b811914c536c3fd374cac6fbabc1dddd1ea0ed9966c1ed409b3383d06f0f91969427c682756d392d6c112c
-
SSDEEP
768:4KjA6+++pnCpjBHU5U0bdWf23vZlDXLLo41b4HxtIaz4LFp2ScM2b2Eu:t8nCpVHUK0bdWf23vZhXLLo41Pe4LFKE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 4816 msedge.exe 4816 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 884 4816 msedge.exe 83 PID 4816 wrote to memory of 884 4816 msedge.exe 83 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 1952 4816 msedge.exe 84 PID 4816 wrote to memory of 4664 4816 msedge.exe 85 PID 4816 wrote to memory of 4664 4816 msedge.exe 85 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86 PID 4816 wrote to memory of 400 4816 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\782ac603d5991d42afdefb65779b3562_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16258703401701347530,9894766899948486845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1KB
MD55869ce94256f9b98365b33ea188a1a42
SHA1dfb75919b5f770387a5f0f47fb0cd5eaee4723f7
SHA25622ec49d92656355149e5222991b562d8a6999215c31724114f1f8b7da8c8a745
SHA5121cdde011df3cce6dd7ed63e5acc19bd24e1b655fb184270a82d2f3e6f2382b7f83924fb7daab4d9014937a69467cdb7b37dd2b0c332dd9ce2f5c6fd23d8b77ca
-
Filesize
6KB
MD5e1b8f7a5a28d37eeb467b7c815cbf209
SHA1687ffd75b45b388eba6de0d57630df9eaadb459d
SHA256d2a52615bd779200d39ef29fc0b4d544f69deaac6b204b98d59c0b23d4545187
SHA51218446cb29a4b5973b89ebe49d5aac0dd747a4b9f2067f340389ee372a3b4f3a8db2866368d584355f2fbb702612e67ce6ad2008ec67082a11836aeab4953d808
-
Filesize
5KB
MD5c3652389bac06eb67238c7184bc01989
SHA1c6f28934f6be784ab6e48b240e1d283691995389
SHA256645799dc57995888833f23e64924c899b5c5181508cb1a0289f32f163e13950b
SHA5127c5c73e0a56f1f1f3a8c51a686c8a71e7355bf1ab197b23398bb00f34307c99af3a9d272150172031dcfc929825d7b3405d1b428bd0fd9a67c9dd8781db1b778
-
Filesize
6KB
MD5d86f291780c7524eab253f559ee2b9cc
SHA1af8bb0b926018e0e34afd07c34226235e4f8230b
SHA2561877664730b901fa57262376a7242c7ce36af6d5d34a0ea48f326b44da7e967e
SHA512713fe4e7907747ef5630091a9506ccd37b58ba1a6002d7cd6cf2644f5e749406239394fad182ecc63e4c30aa4399cd291b68601e1690121b658e20eaff8d5382
-
Filesize
6KB
MD52a180bdbf2ec724f50810d40ee932101
SHA18c17b09e105da64f97e59d00b431a9f026c5b3ff
SHA256828a3efaa15e3dc75ddc049ac7c480a0e57bcbc32e94ed2036058c0aab967fcc
SHA512a29cf7c792e0521c1ba70e517a260f10911ae3274e254a7bdf49ce7986b91c99ee4422043d823d47cf11160224f773196753064969f1c8e59ae47fd9e377260f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b60b43af5dbec40bc672969a9606227a
SHA1b2d2a2f6ac7b9e60e8000b42fade5d46eabe5b64
SHA256d126cd0508352792c4263d8a08b2d0f4001362394a19161f02b33bd287eb2a0a
SHA51267fff5e6fcafeca34be9058c5c840500a5ca9a4254b5c404f27d0ab5c042c9299ca029841113dfe4f7aa3a02d5440621e1b353aceadf8ebdf77d515e480b7b38