Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
87191ef8c6e40b608484b3a584d505fa_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87191ef8c6e40b608484b3a584d505fa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
87191ef8c6e40b608484b3a584d505fa_JaffaCakes118.html
-
Size
37KB
-
MD5
87191ef8c6e40b608484b3a584d505fa
-
SHA1
d0751f9679cc18f2947741469a9f6d738c4ffdda
-
SHA256
b10e7f4fe2192a9acc5a0027f9ecd609d534d0bbb9752a08bbd390ffbf8ed584
-
SHA512
c83e0be83caddc3d14b6f6b06d356747ba6e6ef4bb2fd573555d08559f03845fb5b4999354f553c2c9439a824a9360414ae10ab6dd6b645739bf34b3f257cce5
-
SSDEEP
192:uwLRQgb5n7nQjxn5Q/QnQieDNndnQOkEntA6nQTbndnQOgLcwqYWrcwqYFcwqYmv:qrQ/GnfmRceGYolculk15FpMSCKt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 4148 msedge.exe 4148 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1628 4148 msedge.exe 82 PID 4148 wrote to memory of 1628 4148 msedge.exe 82 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 4360 4148 msedge.exe 83 PID 4148 wrote to memory of 5040 4148 msedge.exe 84 PID 4148 wrote to memory of 5040 4148 msedge.exe 84 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85 PID 4148 wrote to memory of 4236 4148 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87191ef8c6e40b608484b3a584d505fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092d46f8,0x7ffd092d4708,0x7ffd092d47182⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,4386481287511214589,9164374115043281272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3456 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD5db162d31b32f3d4d55c8bf549c9751fd
SHA16b611a3371eebff4a9081fc2a060555566d6e355
SHA256943128e506b410cb98d9d4047c2f672f71636f15c418b3ff8cce376a9a768b61
SHA5128ea51e20f1d7a8fdd037f7a83fccdce3d08efc68767cbe52ebc22ed88f468c74306342da06c853a1a1c545bba857b128f48f9c7453a6fed702730ec63e82016f
-
Filesize
6KB
MD5cd61442e261cf396cf4b68f259dcf007
SHA1b5b7e3df37efa43fce380a319f18bc59c3c50ef5
SHA256942eb9c387add32d09697c405795ed4e907a7da35501a61f7e0201347d81dd78
SHA512703103cee8b6edf5c42433f4a7098072e408b092502e1eee768a9be067ab681a4c2cc8dff108fbaaca0aa78787aae09fed4a163fcee1790f830a189e44299a18
-
Filesize
6KB
MD54e57d173d79801ad1ddeba86345de2ee
SHA199214e38fae2e4409b891a495750d02cda9c575a
SHA256b7404183f8f86a8a0695a0770d28e8dd70c5e581ffdf0548bda8a9c570ad8513
SHA512c3c61da5059bdf6fc358a41c0bffa5aac4ead75ee171e4021d96e97fade92cbbc8d97666dffc0f8f5eb07d5a9fd893a0fa52a58aa3ace5e088d20ab46f123824
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD573aef2b13b79bdca781f8d6b7b81795e
SHA13e469687fbaf4834e5127ac48f3ad4832ad7cbdb
SHA25687b378fd8dd1dfc48ec8ad50eb71476319c5bf2b983e2776faedef60d2f27e9c
SHA512ee7b7bdaada30b02681943d3f1e9feb88b26a1fd8615b3aa38ed65e13327075ea771601ab0035cd5837c66f78dc29c974f71dd442ce71e99a4ce7f32dc3464af