Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
9a9a7ef03ed359d96c936c7dc28032ef_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9a9a7ef03ed359d96c936c7dc28032ef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a9a7ef03ed359d96c936c7dc28032ef_JaffaCakes118.html
-
Size
4KB
-
MD5
9a9a7ef03ed359d96c936c7dc28032ef
-
SHA1
85e4a233b9565fc98a9c213f3f6e95586c862309
-
SHA256
2b26468dfd305ada218a6f6d6ce212aabf59b1996efcf267559c781d3bbd0f27
-
SHA512
53f430eed4571f144c249d67133ab6b7f8c408377f15bc0813d82fd204a40ed9b9b8106f9166901328987a9bbc63e81c1ae2182e307860bb43c26a9cd4e8152d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o2Ed:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1640 msedge.exe 1640 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1164 1640 msedge.exe 83 PID 1640 wrote to memory of 1164 1640 msedge.exe 83 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 2632 1640 msedge.exe 84 PID 1640 wrote to memory of 1028 1640 msedge.exe 85 PID 1640 wrote to memory of 1028 1640 msedge.exe 85 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86 PID 1640 wrote to memory of 2200 1640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a9a7ef03ed359d96c936c7dc28032ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16881330925549666428,7966479007331923620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
292B
MD5cf53b2f7dd2bb675ead1eb5e3f8e0390
SHA1592b0304f5b2eff2beaabf19edc253848454a035
SHA2569fc2c72957e6a7599e5bb49c85302654023143eaf62650769a455d902cc8f5e4
SHA51271d5a1ecebff19dac0c53d05a46ad5023e10d5b48da15152fcf88eee2126662a4a8542415fdd1cd7d744029d60d30bc055c8dbf18f57a2720682c0d7f1ada1f1
-
Filesize
6KB
MD5ab34caa8b04c8ba68890f75df71b52d3
SHA1a98d9572432dd2d4957e4f67c6e21e5147e64f32
SHA256e878a27cb82b0fc57b49af21bd83d8711a36d7e83712a9823a1cc293b20955f0
SHA5126baa9bafb0a46e4dbf1468ee1cd5af21e7fcfd9a32a4998508d400e5cd0ead594d399d6279092daf23b580e1dbbe16e60264ff7a941a8e626ff6b01d2bfa93e4
-
Filesize
6KB
MD5d864e6e807f1637984d115057d81037b
SHA190844c31548afad0ae807c8a989454d980bf5139
SHA256fff3f9d5bf9cb3f5cfb479d5143dbc21c1220c02d4f85938c4d8f84c9b5e69b2
SHA512bd0f3d21dd1d5e808351f0c9ccb4087bc3690ad699a5eb6ab63802128f1ba9162fdd3ba56f1ea9f7d66bac3b6eb120c9d907c41f5071f256b1823992a98d95b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dc8efd02ff59f184ee8d34708ed05acb
SHA10874078251447181589ccf5b26ac78f5ff28d0c0
SHA256d16376ee6ae6f0b295a8e1d8fe107cbf8962f2a4837ff7226114e68f3b514e45
SHA5121dec6f10498d395d7873a6babd01a1e459bc872fca41f70aa440912eec3ebe616b252d8789181e98cda7db71fa17a00a7dc61761a0eaff4b31e22580c7b3f226