Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
-
Size
4KB
-
MD5
88b0d0600384458e8465291f5c4e804b
-
SHA1
6af306ec5399bc5eb180662fda4ca10f4fcf5983
-
SHA256
e03581237282264b63a38e3e3b8f26ddee93c3b991cf97c9512d0f3dfa6cbea8
-
SHA512
14b88b5d0a52c525d6801ebcee7943723752a5d549ba265e5d02ab088f7e99efd3fd9066bd053657793f05c2ae0c79a20c88c5246fa858fca840f3fdb67c3ee5
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ooHVzKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 804 msedge.exe 804 msedge.exe 2328 identity_helper.exe 2328 identity_helper.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 1684 804 msedge.exe 82 PID 804 wrote to memory of 1684 804 msedge.exe 82 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 548 804 msedge.exe 83 PID 804 wrote to memory of 2740 804 msedge.exe 84 PID 804 wrote to memory of 2740 804 msedge.exe 84 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85 PID 804 wrote to memory of 2676 804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12509141486454756995,8350700159124414801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
292B
MD5376e7ca8ad53030753a1786f41c82a24
SHA1ec8d05ba2ae6281ea016e8b20c1ffbadaf14ba49
SHA256d65f4dcae1b0a79932af8552c5f07840823393c7e9c2d7776243f5d5f655ed1d
SHA5121aef4ec37f0193b7cf67d08d983740e9cef08eccd876fc426b02a7b9bf8d1a902a06acda632f3dc878bdf86a35f2dc6f9083da8833014c939a06c035dbe026ab
-
Filesize
6KB
MD53d074ad57ad656af1ba753b21cc8b6bb
SHA1fb2003c0de81d192947b844f8a91408b98252dc6
SHA25663ea736b89bf86b67558a39c995d2b3a07e8ed92600d2450152499445017eedd
SHA5121cc371e7b68347b36dd6cb214b493a3e882583948aca6b690d57f501afe79f8fe07b41f99cb6945382de96d7f8bdb2fd53f9bdbec76e0f7940b2a5fd352780e1
-
Filesize
5KB
MD5bdd5b26d46d7d806a0ed13cf4082adc2
SHA18412cf44633ff2e03cc6fc5b0c96ffa4d92c3081
SHA25647d543e0f8a04d56300f337d91902f5307c4a064795b0ca566c942b11471a2a7
SHA512a7c422701e476d8a610f5928fe41a5ddc2f990aef5a7898c078132fd7aa42a9799335e7a03081dc34fb294e2cc480a1249eefeb386e1f9430dba66fb1a7d8457
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57fb5e84043dfe621aba21291ecdd4171
SHA1e706075d3cd5abcbc9a2cca651bac98fe943d128
SHA256d5cdd15e190356abbbf9733b6b55e054d45a50fb7ebc5e9d122e5071c40efab9
SHA5127be85c1f5faa5c5eb6b06e7791fb985f7dc3f45e1cdcf9610f9f754eaf54587526a3e90fcc89ae062a48f2dd708c60b174a701a49b2ebca17105f00d16157b30