Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
7dd343048a6e0dad3d029000e008988e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7dd343048a6e0dad3d029000e008988e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7dd343048a6e0dad3d029000e008988e_JaffaCakes118.html
-
Size
30KB
-
MD5
7dd343048a6e0dad3d029000e008988e
-
SHA1
904bff889d1c9568fbf843bcdf0d0d305646c76b
-
SHA256
355fb018c759a2028211cf3e6de306d0e9cd82c8795f41e6ea4e4309b60b73c5
-
SHA512
e0a9cce73f425e86f7131f564082c43fcbf72953fedd933b9c708ab0fc5dcc0385c25fa33e0b9b46ba7609c5279dd5f17842f92766866daf79a7323c06b9645a
-
SSDEEP
192:uWTlb5ngCnQjxn5Q/cnQie/NnHnQOkEntU+nQTbnlnQfMC6A6jft/pNdozLY4c9l:sQ/dg9ft/bKzLY4Uc6jKzDGTUvshOju
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 4668 msedge.exe 4668 msedge.exe 1816 identity_helper.exe 1816 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1824 4668 msedge.exe 82 PID 4668 wrote to memory of 1824 4668 msedge.exe 82 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 5024 4668 msedge.exe 83 PID 4668 wrote to memory of 1236 4668 msedge.exe 84 PID 4668 wrote to memory of 1236 4668 msedge.exe 84 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85 PID 4668 wrote to memory of 3908 4668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7dd343048a6e0dad3d029000e008988e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa54ff46f8,0x7ffa54ff4708,0x7ffa54ff47182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11214127081678697853,2103176434435761534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ed6ae5ead3e83b61c8ff97f274d233bb
SHA1e9ce278ec1b9f1ae8caaed7accd17da77bf2becf
SHA2567c40b8a6c4c90b749e0c7664054974f4ec8d9dac4e2ad9dc31ce07a7286da5ba
SHA5129d910302c28b0090151ddba08979704b247d4bb17ae219ba10c649e96de8fa8cabde37490db24a8f36be24e0aa490c6ad39f721bf9abd91297cba4abae0204d1
-
Filesize
6KB
MD5cd6ecbccd2131234e016f2557f4b3630
SHA1c55629b5aba09423d18b1aaa38ee3eb494075ad6
SHA256f5da0a8ef6ab8f7cd989aabd185127b7f7bd6c33090373ce3ef26ac5ca52164c
SHA512cf127aec08a56e74986ac29554d5e4bc71100d26f95d0afeeb0dada648b9d1e24d0112856adb0084fc0afe6d00f6fda991ff67592b204a0579c4f12007ec1937
-
Filesize
6KB
MD57d0007945525d9e38b9c3a7edac904aa
SHA1cb6e233adc733eb5498ea738cc11c0fae028d8e1
SHA256d1a40327122c6614102872dd2772c5c312ac6f32716736146b35405aa545772f
SHA5128250520e90f1949dbacd95b3b023c8d527bbd0c08654270d34051ac67b18921be3b16d3f365acfac1db9d3695429c7ba5ee9a06f3602fb03821d4abb1481e57f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5eb227f965a68f526682494de5d3c7187
SHA173953758c46c0c6a298aaf30bbc23640cde24ef7
SHA25638d32d979baacf7746ba6e4739a2007f0ae09a909a1de1ccb340ccbeed84182e
SHA5120f2e934c3d218033ffb8efddb5f6f821a0473a5f3e492f47720588c52b2bc385160426b03ca22b2a4aedeab210b887b91ee42f06be6c9a765c0eceb275694980