Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
968e1f9c5f31c1d5a516f5889dd5d7e7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
968e1f9c5f31c1d5a516f5889dd5d7e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
968e1f9c5f31c1d5a516f5889dd5d7e7_JaffaCakes118.html
-
Size
26KB
-
MD5
968e1f9c5f31c1d5a516f5889dd5d7e7
-
SHA1
948874c6aa88baeed8fe44eae10b67add9f6d158
-
SHA256
8ef2c9217e3589be4a7dd5a86a5b6f183c75a3a3b7b661d9b9f1a75ad46fba7c
-
SHA512
bb26063a56817628b55a6612056603e2175295e7a40e89b6949836ff4aae21dd1abd0936259851f4e1252ad5c4677140445905e2c9c59ab55996cfb40b5e4586
-
SSDEEP
192:uq/HXHb5n1GnQjxn5Q/UnQieHNngnQOkEnt8ynQTbnpnQsOCJVevo7NteFo+NzQD:nLQ/kygcZ5Jr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 1940 msedge.exe 1940 msedge.exe 3884 identity_helper.exe 3884 identity_helper.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2092 1940 msedge.exe 83 PID 1940 wrote to memory of 2092 1940 msedge.exe 83 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 3132 1940 msedge.exe 84 PID 1940 wrote to memory of 4200 1940 msedge.exe 85 PID 1940 wrote to memory of 4200 1940 msedge.exe 85 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86 PID 1940 wrote to memory of 1916 1940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\968e1f9c5f31c1d5a516f5889dd5d7e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4243254423978966278,17511763400913501135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD530f1de5a25d701f268c6dd6f5becdc02
SHA1076452476d5125b4a98c2ebe22df1b337ffe8043
SHA25624bed3df4f6cba23e994b68f8b9f2a1aae7fa4b8c0524200bd5d4e4a114f417a
SHA51268b56abbe4fcf0ec5ce32fd53053a8879ada7e59230977fc2240e12d0e762f5b5a60fb215cac45c0c03b8e1bef7275ffbb241e6fdf53369e5a7cefbe05c81dd7
-
Filesize
6KB
MD56cef49fb36125f01d4983ee62e54eadc
SHA16a146db313f04e5420a9b238ee80dc0c1fd22972
SHA256f0cbc604404adfbac16108f9ad2f456622cd43d7ebf378cad3b7a196947f7c97
SHA512413d6b3190ff094153e760ef5e1fed63dd91897adeb3418ee728e6cbd393a7d241d1b227655e143d10e4e82ece512bc6858512a46e624d4e2cff420b50621d9d
-
Filesize
6KB
MD520d08851e97151149cb5dfe91eaa870b
SHA151bada54a2c3dbef69375a4caa98e58cd7d93b6c
SHA2568937fcb21ad9c5b8762b9f81f7719ee1bf0ffff5e868da02960540b120ebf333
SHA5127517bd3ab1bf15bb5211e8f076be4ebb4f45ea887ec3be2a20b06c4a7d8bdbd6402bae9bab6119dfa15ad163c3f397aa1819b46409bf40c72fdbc7e202f71e03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5126988ec92d00c509a3e548b24db1ab7
SHA1d7e484527ab162cf6267a38b4e1a055323163ce1
SHA2569bc4be0691d45c8b3074cb720b9aab4af401a9c92c5a7d3c08121222473b833a
SHA512e9f48e80130223355dbfe36c2ee65d9e525a74de7e122e14539a0381217417e764713c5577ca15873daed056c82bb2c5c027838fd8660225ee7a750fbe9adf0a