Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
92cf8d81b40b799009427067f0b1137b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
92cf8d81b40b799009427067f0b1137b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
92cf8d81b40b799009427067f0b1137b_JaffaCakes118.html
-
Size
23KB
-
MD5
92cf8d81b40b799009427067f0b1137b
-
SHA1
694fdfd2194d115961167733fcffeffcc836f8fb
-
SHA256
53981e299fd37a0df1488306b0fa0ad31b0f011b77d3e525b6308ec493ab2b0e
-
SHA512
1f17c8d1f59dde9f73b32f03c24f758b7ceb809d405fb18a5d720ac0970aa1e7bf64a01f0e8bcd7c186a45cba8ab6fa8d1086879188a7d099c711303d20fd3c1
-
SSDEEP
192:uWnwb5nHOnQjxn5Q/2nQieNNn9nQOkEntm8nQTbnpnQvCnQtxwMBtqnYnQ7tnQYE:SQ/LPK4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 5036 msedge.exe 5036 msedge.exe 880 identity_helper.exe 880 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5092 5036 msedge.exe 83 PID 5036 wrote to memory of 5092 5036 msedge.exe 83 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 452 5036 msedge.exe 84 PID 5036 wrote to memory of 4008 5036 msedge.exe 85 PID 5036 wrote to memory of 4008 5036 msedge.exe 85 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86 PID 5036 wrote to memory of 4184 5036 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\92cf8d81b40b799009427067f0b1137b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3725325555758602985,5469539255677056743,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3deb4642-19fb-44b6-a284-1bb86463fe77.tmp
Filesize5KB
MD528898baef9c2f9b7a886376bee8d4a32
SHA11731058adfcbb661dafa9aee9ed7bc011ce753fa
SHA2560b54bc1fde3c18832f9b8069d142d0d2e0174f1ec19b2818c83bde950aeac54d
SHA5127bb1a97da94c9cb2d3b2cbd5c80dcbbe122c77e66c7dd62e718edd25c049b0e7e5f26596cd5687ce875df8203e032d49cb84e077c61aeb1a1a65e5bc0df81825
-
Filesize
6KB
MD5da46e04dcf9d49573c6f52c8c1b18d79
SHA14a45fa337e0e77f468880569403b8588da249ac6
SHA25642527bee21604a9a0a5dbe19cdd0c5bc923dac0a21b50785236bc50ee44e0db3
SHA5123aaca73248dd2b975e5713a9b7136966aee5fa15f594a16ce76ff3b4354af5eba495c54753462f6357e4aa4435f8fa4f15393b429d4795a0274b3aeb0f575d06
-
Filesize
6KB
MD5ca8ab929a040eacb4647e0c94504679a
SHA1ba5baa08bfeb44432dcea4887348d64c265b1ea3
SHA2569cd710fc3283b4c15b08ab354522fdbadb8fb6d981297ba5e028f55b36118edc
SHA512539330a4e41ae7322d0a9cbedcd995827b555988f84507bbb32b9abed09e01589efe8ac4b70cee31d889db30380998f98ecb5ebac17e5838130d6fc0ab5b06f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3bedf9a2fc5197fc2c854c6288b3ff2
SHA18b336de377a70324aa834c9f10afeaa6e021822a
SHA25617714c2efde8754e04d49b3044729bc8062521d4c8a5c064110c9ca4cde4be10
SHA512dcd340f7cff694d5609a832c7ce54ad5ac0b07bbce6e7d460a9a40e938812cf7777e3f6f1ba2487010346d30451609af097b1b1613fb38c26ebb717a5f9995af