Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
7da6ca5dc8ff23f884e5e833d8ad39ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7da6ca5dc8ff23f884e5e833d8ad39ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7da6ca5dc8ff23f884e5e833d8ad39ca_JaffaCakes118.html
-
Size
58KB
-
MD5
7da6ca5dc8ff23f884e5e833d8ad39ca
-
SHA1
f7dc99b583d64b45f1670825d52c9f67750d4d55
-
SHA256
d4105ee1638e94421371d418928d84472005aefab48c9b1b262947971bf41e24
-
SHA512
a598b6cb9bd748da6fda4d14bee43d3460b68b7ccf0d8deb73a3017b032613304bb82a3bf69a512b8a6668552cd7d847dfc79296fce45825b238ec8a55f8ad16
-
SSDEEP
1536:Zlg8qB4CmdCr8N+OZ+/Qf4KFHl+fk9lQ9HNerO:QSdch/m4qUKQerO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 924 msedge.exe 924 msedge.exe 3352 identity_helper.exe 3352 identity_helper.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 924 wrote to memory of 4936 924 msedge.exe 83 PID 924 wrote to memory of 4936 924 msedge.exe 83 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 428 924 msedge.exe 84 PID 924 wrote to memory of 4496 924 msedge.exe 85 PID 924 wrote to memory of 4496 924 msedge.exe 85 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86 PID 924 wrote to memory of 876 924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7da6ca5dc8ff23f884e5e833d8ad39ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9439821551621152229,3587151919854232573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
186B
MD50644ea0800b16bbc3eb3a6f28e69c016
SHA15d6d133999de7af72727b96b6e4a6d58c420f496
SHA256787a30749eba18ff2767a1c70f3769db2406ad85a7e55be56fcb54d8a2e0072b
SHA512722702a53cffc10e72525a6ed7f93b263ea92a5569b6ff8445d25aea2f0d09da975f74b223ceb64a24b91f751e92f67a66cd1a12c65ba2c35b6db1e920661621
-
Filesize
5KB
MD59574359b7c8d879d97f8065d18764539
SHA1c63db7955ac28b70ddbb8dfdf88315009d66618a
SHA2566922281af9999448a5b5e0cff7460dc53d7c6a1286f16b5f26b277cf7476eae3
SHA5120e0d80a41bb54c91eca00e831f50d0586be2590d9f58c7c44200ab8333801392814f51049da3fbfeb40337db0b87253d7fbceb858b44b5574571676aa8e4e7d5
-
Filesize
6KB
MD53ed7f045e403e361b17b8a4dfbdaf7e0
SHA1e905d8c357582c31386d91e06ddd10546ef45a82
SHA25631d68731348b6c0d57102c4f07045689fa625cb44fa88935415f50af522f208f
SHA5123aec9a73e755692e40cb1f308d808b61e11be87a425b09706fdca3b114c4261d8cd1b45dd5293ec7ea5196a182c65844ac5ee0faa990942715307f8df6e9b5b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e1e840c9aacb58698cf19bf06ef4674
SHA1cba245d7e4e1a8e5cfe3a5a27e50057a367ef030
SHA2560d12e67bf63e823f2eda966f9881348024196234bd5f623849fadb4a8ce49063
SHA512bb0e210d17c617fde464e6afa172348ac368d9a2bbde1336f89b1eb53ae70c328bfa758668d93e1ed04b3fb09d51823c23161d75338712fb801c11b03ed021af