Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
79fc17814557abb3b9b4536db7770ed9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79fc17814557abb3b9b4536db7770ed9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79fc17814557abb3b9b4536db7770ed9_JaffaCakes118.html
-
Size
20KB
-
MD5
79fc17814557abb3b9b4536db7770ed9
-
SHA1
d03f44da8f6b6beae8f8a483e83152da18597e61
-
SHA256
df780512075d19ce13143040f9240a7dbe1fef3cbab3bf1d2ab81fffddef4edc
-
SHA512
6771b2459ae9e47d91102a27060374869d0e20f2c779e41d0e63e315949da4a4a83af53f1e19534231599efbf6de80e3fce0854c693c1d7f8128e6529ab98e56
-
SSDEEP
384:XHK0g6e7eMeoeQeST7kteGdGFAYlth6SG/6S0eFezCq9lWJWF3:Xq0ze7eMeoeQe66eZFAYlth6SG/6S0es
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 1312 msedge.exe 1312 msedge.exe 3796 identity_helper.exe 3796 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3140 1312 msedge.exe 83 PID 1312 wrote to memory of 3140 1312 msedge.exe 83 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 776 1312 msedge.exe 84 PID 1312 wrote to memory of 4352 1312 msedge.exe 85 PID 1312 wrote to memory of 4352 1312 msedge.exe 85 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86 PID 1312 wrote to memory of 4404 1312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79fc17814557abb3b9b4536db7770ed9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2253527893951409956,5227257730328217515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD540ef70df2c6bcc3d1be27d72a4dda0ad
SHA1051112418505ecb88bcb9f69f912bdd33c7710fe
SHA256b44b5f63bb45cb9f3aa1c87aca7ab2618a9082b8052212cc7b6155d4dfade461
SHA512dc46614d41143190acf77d91e00413fb099531f0c24022e7fb67ca948fcfa9319a390222065ffc3e436bd95d6d4b27e432bc4a11c93ac080ffe1fa840e97d3f9
-
Filesize
6KB
MD5421669011567df4dacca0d512d9aa5de
SHA1206457112293bd8110c5ffbe01bf046f3f648ecd
SHA2568a5a98b3b4201ac7bb2a0b39eaccaaa154f458ac68c3711e1a1e60f9b176fddb
SHA512e84dca1abb2d10ade742cb77da49b2ba411447624f3a6ed7f7130c0e6a9dcaf159b592970b58c5a7749d819c8c01064f8e15535722d0a80376fc3d836bb571af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ba6bab840b5ae4269924e46498e78580
SHA18c57509ea741bd42a687aa735fba4080a6ed786d
SHA256d568e53dfc98b3e6c2bb0500ff66ee6c23554db86493b328b2c87a6e446bcbfc
SHA51287301c40c89224dfe3c0b87e996d6802c0a30c6aeed74e64d112b3c70ab8207d6a276422b5a0c3a6820c518f95e8a29ab506780bd7fedde546917907ba8676a8