Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
851ed8510013880564a879cc6aef7d39_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
851ed8510013880564a879cc6aef7d39_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
851ed8510013880564a879cc6aef7d39_JaffaCakes118.html
-
Size
11KB
-
MD5
851ed8510013880564a879cc6aef7d39
-
SHA1
8d3263edec676b88e9afbc5afa88340b41525455
-
SHA256
adaa399e548cf7021f821de02f256ff314474f9c7c593fb31d84e516193652dc
-
SHA512
f76b4817b135925935670605fff013ec4636c30acc5fec446ffe9ba536817bfe7815f893470b4d27cb4d1edd1a366c7919853dcd25d65dba585f56a0a58ca816
-
SSDEEP
192:uiop6fhJtAGUHfubcZDl4Ets0iUpkT0tVwJBm9wyT6Vyhu:uiu6fntAGU/ubrINpOKKJ2T6su
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 4656 msedge.exe 4656 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 32 4656 msedge.exe 83 PID 4656 wrote to memory of 32 4656 msedge.exe 83 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 4892 4656 msedge.exe 84 PID 4656 wrote to memory of 1532 4656 msedge.exe 85 PID 4656 wrote to memory of 1532 4656 msedge.exe 85 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86 PID 4656 wrote to memory of 4996 4656 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\851ed8510013880564a879cc6aef7d39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff850fe46f8,0x7ff850fe4708,0x7ff850fe47182⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,584521445644058181,14863110091652616433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
539B
MD514e3e4db56a1bd960a89b96f6588a6ab
SHA13a8022d6e0b4a14e65201b3507179b47a1427e28
SHA25652b5d53ce15e1e3d517f7054a355a3afabb3b0b731dec54f5b65112550bbcc7e
SHA512ffe920992dd9f81d685b6cde652d432e2eed33e30701aa6def52ec55f062a73efe647eca957b043b93e476d8c4676755717fe7706df5c3742d60851d707ccbb3
-
Filesize
5KB
MD51470668306e909d626b9265ada125643
SHA1458ac44fc7a2b8a73871c20175a5ebdb103e09b2
SHA2563dd957ab9a19444659585fcd82f797ec075c288ba0273fe43aef660f81510bc9
SHA5126efb8dd426c7be67c940ca646643954f82d60f081456f78628bbe878b65b6d3898e84aeb1c8a52c81b7f9930a09fc717f73530bffd6a8384f1ee1665ba0af511
-
Filesize
6KB
MD5f7a89fb132079e85e4b0619fe1f52768
SHA1ad3549592a61ccf9808ae5bdc74fb1000c739978
SHA256b00e948d0e8c398946d8879c3184828e03358a873a0e8d24d9da90d037083e3e
SHA512b3dd0ff000a392a31dc4019d16f8e18813ef921f8a969b0e0a74c67cce970522a629d702ff80784907e869ff67bf60ed62626a405de7d1e671ca16907cb43272
-
Filesize
539B
MD59ff80029848052dd0aa20d887ea31dee
SHA14fa42987e09e891f54796cc6d5dec7a76c660a52
SHA2569c579470d3b7a3deac02f3e458e56bde2d20631fa269ef3e10456d629a444a64
SHA5121e95d66caa25d624ec4a1dacc50586b12aaeb9ae2833e464baa970f4d96e11365f429e7d2a7d22da4cd486ba710c20f9ee2a923f816dda8e36a6c545ace33a55
-
Filesize
539B
MD5420f2b648714815bde047db58911842e
SHA177967fe2a81495a563df29cec44526df5706af33
SHA256ecf9f44df8d84222676b1ba5a32e519726e721a1580087085c94707558fb73b1
SHA512393cdaf0f47afca49bdaf19f939365c57fe55426fd17247304fc237c3e7486407c794331de3f79bc995545a18dc993b0211d29fa3ea8c527c810159d879baf4e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c9f5bc075addbb6c5728d0da65cdf7d4
SHA137b08e61124fae04c30ddb880948053249869b8c
SHA256b95566d01f1a69bb394481ff888f38c27c80aea2420553cac81fe58739b6ee1e
SHA512437a31454c7f36bf730918723fc03e23faefd7724ec205b390ea25d7ab86c14b724ba7a6714235f00db43a96bcdc6210447fda33d3649e202f7f3ea83b214d4a