Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
7b57e8eea4ba37c48fc4050138268859_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b57e8eea4ba37c48fc4050138268859_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7b57e8eea4ba37c48fc4050138268859_JaffaCakes118.html
-
Size
23KB
-
MD5
7b57e8eea4ba37c48fc4050138268859
-
SHA1
4698270a1acad18e79ea0c194a38a7b17cfe647c
-
SHA256
d331a7f87994e8e6fd22e4fa231a19647b76f323b01e6a1662889c927433aa6e
-
SHA512
9eddbf068d489a822dc33e0685d7f02320dcf5f909a7af758aac6e102ba3cfec719a373a451d4e9053f557b511257ad73cb912af24ae01c9ef802dd38cab20d5
-
SSDEEP
192:uWXBpEUcb5nEunQjxn5Q/bnQieCNnHnQOkEnt5RnQTbnhnQKjCnQtIwMBiqnYnQI:pQ/b0R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 5008 msedge.exe 5008 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1772 5008 msedge.exe 82 PID 5008 wrote to memory of 1772 5008 msedge.exe 82 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 1900 5008 msedge.exe 84 PID 5008 wrote to memory of 3492 5008 msedge.exe 85 PID 5008 wrote to memory of 3492 5008 msedge.exe 85 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86 PID 5008 wrote to memory of 4552 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7b57e8eea4ba37c48fc4050138268859_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9d0c46f8,0x7ffd9d0c4708,0x7ffd9d0c47182⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1316 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4510347204814799304,2255587985676074870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD568270240cda79a9f40ab27a4271a3f90
SHA15a8f84af5518534fa4c1e9139394fc9d9566d67d
SHA256b756d692abb6fbd8d8d0e24b677c4082aeb607c10a070e5ed51838179bbabda7
SHA5120a7560bc08caa185ac47c25fb86a13094c34223670a957a9550d683f90395bdd80a0d8256a73f4483ead259e8af11c78eb3526247f46ec17d5ed2cbc594602e5
-
Filesize
6KB
MD59176871527627bf331f352df28e84672
SHA19601633e14183d3c1983bd319747702eaeee28e6
SHA2564183ae502709a516f8b3ca2bbd9c11e26ce185fb5445a2f83e6256a3c2927988
SHA5125371a01ef7bcecd8a5222e29aafb388a1b6aaf2f9ed2ce84eb210d2e18c7e2c5867ee510abc4d32e169244abae954255735b7b613bc0553a55dd844cbf4ef8ea
-
Filesize
6KB
MD5a57e5858638d44c06d4c9778d168d90b
SHA1cee4644699779ec764713580f3b827c18523f58d
SHA25667b6f8eb4ba5594801df7b12687e13db8ac160a033dc258a4da7327e56772ffb
SHA5128376fe3c537ef4c62b46e6082786d561303095159acd8f0437b614308b68da0c116f2b4035f0845c738a45c1c596daa57627f64b47a4eed6664c0a34dd246461
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a9abadb1b6f79c35873205bb3ee4300
SHA198ac4808415f3bcc8c3a441f3e4e17728bf4b36c
SHA256f296bf4d8ad758e5042357123df5ba99d430e55ad91ebaafdd5d151213d24af4
SHA512cd3a10d686d581d3fe531cb45711f0bb1e231e21499a720b707565f725c786656302e0c9c394748dc0f004c4c624c4037b5cc0041c678b87dbf7798490fd434e