Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
7c48d8ae4016b353d09b6d7c8eaca5c6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c48d8ae4016b353d09b6d7c8eaca5c6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c48d8ae4016b353d09b6d7c8eaca5c6_JaffaCakes118.html
-
Size
33KB
-
MD5
7c48d8ae4016b353d09b6d7c8eaca5c6
-
SHA1
cc743c953fcdec090b9dae720746157ce2929d3e
-
SHA256
e8689387b245371220ffc3e9c69277f06d1cb52ea48a05de50c379ee2fac42f3
-
SHA512
1c8011b05effa1b2b70b967dbfe1ce3f96a54dbfe75146f54d0bd9488096fc0c664b9175cfee64131131a29bf5afbe7f7a93e71e9527c144778589ea442ec149
-
SSDEEP
768:kg/qtpOzycSi0R3Y/bMCM+cfW5lYELNQHZNw1fmQqvrQR7Bco:kg/qtpOzycSi0R3Y/bMCM+0GFZqM1OQ5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 1652 msedge.exe 1652 msedge.exe 1332 identity_helper.exe 1332 identity_helper.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1092 1652 msedge.exe 83 PID 1652 wrote to memory of 1092 1652 msedge.exe 83 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 3708 1652 msedge.exe 84 PID 1652 wrote to memory of 4692 1652 msedge.exe 85 PID 1652 wrote to memory of 4692 1652 msedge.exe 85 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86 PID 1652 wrote to memory of 4200 1652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c48d8ae4016b353d09b6d7c8eaca5c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9734662978119757263,743842008732833133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
341B
MD5da970ce9178017518490337ccdf05209
SHA1d3f535d3be0b181a45e793854ce582e62a14c3ca
SHA256869f0ef97ad23e4e4ee4e6285e69de7d94f4fa9d2a8335203e9c312e5b9410dd
SHA512aaccd6a28a5b57b8080a12b78305a299103775797488a38fb3ff35f16b480b28ac926ef29fc7b025ce755eb0da3b5145d210a0d52917d9be14268dc173c96453
-
Filesize
5KB
MD5687bb07d78012bac928066f82464d751
SHA12c7955a6429ebb0d797b11d7095a02a83d053456
SHA25643b7870f21dec67d2a9d12ce0c7347fb9bbde6fafa110868498f7d1518f4a181
SHA512382729c58f90436541be7f846c46fd4137132465fee75393061f2d903adf6bc5a5e42e1332bc5673909929358387bd0bbec9cd500546425ad6e20b7b1c70e473
-
Filesize
6KB
MD5d3d17a95478f967838e68cae5f7b4345
SHA1d5350a435d9c29004ff22617b037b5a5d95f52dd
SHA256bc83427dcef70e6ce3550926d307a4789fbc49dcc5c0487ac9f8a72e4f9f6ec9
SHA512806b5b4b6538112bf37cb2bd06df1cb74fb117295e50624d648d04d5d845926f08fa7aaf113684b847a0b7b6cabd4bbb1942aa59d35b0f4664d8c1fbf375f972
-
Filesize
6KB
MD51f44f46fbde09a105521329f9c775b9f
SHA1347efd4b318fb642a72163cd097f4c2fb8a01af9
SHA256f87bf28c9ae1855206a91dfbbeb9d0d6e45bde72bd25fbf037a2b70e9730ca78
SHA512f7a59b29078cdca06a6f244313e8cec7e215c366a850f7ce92a98659c8799d41ff11adb08bc6447f954148f337aec526fc4b92dd8e2f58a70aa74bc34b042687
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59f8ab312756b91121f1ec058b59c88ee
SHA1b5535880326da72332e2b6aa96278f418033089f
SHA25695e42cea31df90ea459432689596854fa2747441f852baa5ec3b08dd72669b15
SHA51252ba9294a34da741a1fc7dcc571822826767f030abbcaf108a657737fe9a22c49eb091519562588342be481ae75d2d73826a279c37f7f29d12a47a48e4b1376d