Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
866541f57047ace36002a64110f53d3b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
866541f57047ace36002a64110f53d3b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
866541f57047ace36002a64110f53d3b_JaffaCakes118.html
-
Size
3KB
-
MD5
866541f57047ace36002a64110f53d3b
-
SHA1
f5250b4221e2d49ebe308046e2adf49ce16bbcb8
-
SHA256
0f4d6c1c64bf49fef41c9bbd0744a112ad6ac12adc6e9b8903a14d3067e480c1
-
SHA512
e9f0723b611475a639db04ccbfb3c63314130fedce117afdb23226fa1c5e882033620d83875d330e8a5d4b18b9a431b68df64206029a8406a3f81ffd88df57b1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 2272 msedge.exe 2272 msedge.exe 1252 identity_helper.exe 1252 identity_helper.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3008 2272 msedge.exe 82 PID 2272 wrote to memory of 3008 2272 msedge.exe 82 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 3052 2272 msedge.exe 83 PID 2272 wrote to memory of 4496 2272 msedge.exe 84 PID 2272 wrote to memory of 4496 2272 msedge.exe 84 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85 PID 2272 wrote to memory of 3484 2272 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\866541f57047ace36002a64110f53d3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8a9846f8,0x7ffb8a984708,0x7ffb8a9847182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6711829228161623751,1283680926211818464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5a4d55cab1573debf7e4fba1cd23155a5
SHA132450c43c1e79ae7329f48818c1d7d1c0016eb3c
SHA256fa7e66c5eed0b71a0cbd56c1f3183bbfb8e2496e85c87ada0a61b32836e5d7ed
SHA51248084a3469b75086639a9d37a904a6f17f59de6510a0fe0011c365a04f4640fae23251eb3dedf947db103d97ff0a76ef292d64f08f4f51faec5dd93952d241ec
-
Filesize
6KB
MD57db41442d4fee8bf0188b460dd40da45
SHA1103d6a74f230ea5ad90ab4047670dfd80ec1c872
SHA2566ed95b5fa0fb7cf2047ba0096ad162354846f0c57c4cc56205a5dcb90828b47d
SHA512c2d369dfd2177e367ff983d83cec0414614472a1031c19294f9a427f274e32bb09c0127dfa67d8d3458e33452de9707c93273717205461ea3314cbed612eccc5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD53d795d79a89c8b9d0c5022778093cb36
SHA19933dd5d9a201335735f01e6ecde4cac3e2cc9d7
SHA256aac86f455d973ee48a91abcec297e76ab94f20b8eb71e0bc7688a4fa59f8d316
SHA512b5ca4619097490099caacf230bf25be06777c06d34aa83737013c8c98bcfb907a413293d267118c06b13742d35a6c2525ed5f2dbaa1d22acc30d2f8f9d51e74d