Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
7e267237429e68f376f0a455c9a05809_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e267237429e68f376f0a455c9a05809_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e267237429e68f376f0a455c9a05809_JaffaCakes118.html
-
Size
19KB
-
MD5
7e267237429e68f376f0a455c9a05809
-
SHA1
015864f328847f1675d646388e31581d6660a0b4
-
SHA256
eb049f7a88ab6d66b5466f0fa4bef106704dd9b3e6f0d76ac186ed28057c05d6
-
SHA512
f101799d12843865b43b1f464e23246c18ba6372a1c713ec78c9096b0bafd0af473de76fd2cdf6660edd499d089d27c22a2002477ab6d199ad55799dbf2bde3b
-
SSDEEP
384:zikKhgESZVBD8c+Q3RyNZpnvnemLxXucfIk99hebnQzVc9+kS:zitSZgcR3OpnWmQOIk9Sbn+q+kS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 1736 msedge.exe 1736 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4408 1736 msedge.exe 85 PID 1736 wrote to memory of 4408 1736 msedge.exe 85 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4100 1736 msedge.exe 86 PID 1736 wrote to memory of 4328 1736 msedge.exe 87 PID 1736 wrote to memory of 4328 1736 msedge.exe 87 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88 PID 1736 wrote to memory of 3556 1736 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7e267237429e68f376f0a455c9a05809_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5566527124103413077,17881121396624631101,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD594929b977c9bb092e863b1923ae4e0be
SHA1bddde5abae9643ca1bdd967bdd526e19904979b2
SHA256eb0dc0f00bea1712c6a9065f57b1db343be2c5c597ee10cf8251e369543616f1
SHA512c01ca5b4b432347357e796d6a0ebfb18596dec25016c85923ffe499cdbc2257a327d5a671727080f064e2bf5e01f57c2c569babd4332c0fb09e63926f616f079
-
Filesize
5KB
MD50f82fb477910f7b1410f816adc5c7f65
SHA101cfdbc3d8a052857472ffb49c92d403333737ab
SHA256d3703f1ed030df1c29b9dbdc0fbbcc97e1c5bfb03e5aa2e879061f209b101dae
SHA51211c8dcb0d419e70ae6c87abd5af06445c9c5ec4d2dfac3495a78e5ecc8fdd7c06b29037e34dd3698c70603c96661389ddc21a40d02c5825ef82ffa0a26d2a181
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d4ba544638b5399f0d2e43bfb2c7cba4
SHA14d8842d48f66665a50d6e5f51b82c0f07198e143
SHA2565b2a65222b01b369c5789658db9dbee4c1f9216ee6ed6272e835f000d38dd516
SHA512fab677c12b9a2f116b2b90cdbd7107ba0935d1b449dece6f4f94b6bef216a17847b17fdb5aef7b5f8be90dc2bd0f22fef6366e340e86e2e726658e7923d5816c