Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
80a25a979a92f0ae9193a296f9ae2db5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80a25a979a92f0ae9193a296f9ae2db5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80a25a979a92f0ae9193a296f9ae2db5_JaffaCakes118.html
-
Size
14KB
-
MD5
80a25a979a92f0ae9193a296f9ae2db5
-
SHA1
b03a423c2315d1406535fc433ff73144017096a5
-
SHA256
275f856635a84c642d55a4b798968a134477abb2e2480374014a244469f8d82e
-
SHA512
98e04a4ec3a0999ffc8c4ca34c87708feb503f61c0deb170ea63b4716c2e2c0d0bf0b9a7be0349946c3c7b0aeee62f099dc70006fa3d5dbf89fbd6d2e6d79a6c
-
SSDEEP
384:P3bY5KkLxHhfLx3UFpyGCc3tpyXp4eWQjR3xehn8zkHB/:zY5KSxHhjxUTyGCcry54Glxehn8z0B/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 1324 msedge.exe 1324 msedge.exe 852 identity_helper.exe 852 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 3904 1324 msedge.exe 84 PID 1324 wrote to memory of 3904 1324 msedge.exe 84 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4176 1324 msedge.exe 85 PID 1324 wrote to memory of 4324 1324 msedge.exe 86 PID 1324 wrote to memory of 4324 1324 msedge.exe 86 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87 PID 1324 wrote to memory of 5096 1324 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80a25a979a92f0ae9193a296f9ae2db5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16728953991614953833,15680296193909868691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
1KB
MD5354101dbffef228983ddeafeb7a8132e
SHA18b1c34e9db712aa18c22c583f30b75adefb2dcaa
SHA25635a75be60dc63e04dce9ae454c6d92dcd96576d05bc678231cd1c53142e5e2cc
SHA5123347fd110c1124e5d1ffe7ba6de3ec20a9f043b7227d01086e37d033b4a728225251fe5494f35bfbc9f7159edcf487ac05703dcdabaf897b2a9b4064fecbd637
-
Filesize
5KB
MD57f21a0092aa2e84424b91524559f91b7
SHA1e4cdf4993794f43fd0dde4782af5bb6f97ed2287
SHA256843b5006f45810a588cbfbf0fc84db3314b4fa2fe9978c474769b4a86bf91f67
SHA512323a2651baeec1bf9c4d8d2f4bb8a85fbee6eaa758e1ea389d2ce541b0a20acf6c5568e6f83138d18fa2900d26271a933e10ca4998c9b1fec2eade4eb80b4dc7
-
Filesize
6KB
MD5f239b5482d885ea1751c0f629a297184
SHA1530db237dac76feb2a99457eec4b31db3255186b
SHA2567433da3bbadcde7592f3b7f6132243c0e0d4ab866e087e066ac32847b070fc0e
SHA5125a6fece7024988d46199ebeafa757df9b1f9c6371242feea62d5ca06b58de47092052543f8b57396498919a4c4c16ac1edfb81207994fbff2219586a61359b35
-
Filesize
873B
MD5d2628db142011408e6eea765ac5117b7
SHA15cedfcbbc3ce4d5f36eb92456083fe63230dc665
SHA256729d5e8ae5f7412ce1ca2012997d34d96f0f28db633982cd4844e4d9a6e90863
SHA512b787c375169b295a2f13c6f72cd98b0e878d2b736a1bd52972f1ba02b9303804f02b37e41439e99542c9ca921dbac19a0fecf1c6d09b24c45b1340d4037b2b19
-
Filesize
873B
MD50e608fd3c6ccc6ce4cd6eafb08f1aa71
SHA10a5fd3346f17fb2d4de14a9f47080f09d9b914f6
SHA25675c27bfa0eb12410fc58b7bdb984c9256f031a2dd3fbe58c346a89d1f7987c39
SHA5122262c7ed8e82b595dd9fb890e81acb0b3319573f3d7cbf1e1546ffe364d54d78c8dca7cc8910fe259f769d369421ef221392574f8b690cfcf54266d71796145f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5832191d2de1d74fa395ade87b4671c7c
SHA16a7503916436c49f49e99e66e205d578220e5b30
SHA256064bbc24d779ec6bc4db49499e78bc584a0b5baf115f72b18343593e83c424ca
SHA5123ea427d640a1f8d61c8d74f9604ac7997f31f2384c3a4d0edb342f0db64bd65752909f84107df55e90bfdfa6d1a4afceffc9cf18408c47bf876d10430f85440e