Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a312e4e4f46a46a9a159d9f92a53fa26_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a312e4e4f46a46a9a159d9f92a53fa26_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a312e4e4f46a46a9a159d9f92a53fa26_JaffaCakes118.html
-
Size
142KB
-
MD5
a312e4e4f46a46a9a159d9f92a53fa26
-
SHA1
219818ed7f31727cc51f94173dbf1fe981e34a49
-
SHA256
a7bf7b55b3141a5c77c4f6646b19902939d1d847e5a1c196d7e7de8ac6dcf072
-
SHA512
02bd051f61aeb11dd5e480d50802296b1634ae4ee77b512e8a49d059b168916b23d67d274cd7c34f7ae2d7343ff8ddc54e7299a232809b3fe176bd0631b04379
-
SSDEEP
3072:U+Y2MYJ6rHfgaToXdYKOH3mBX7tuT9/+ndBbStICY:UBoaTo5HP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 2904 msedge.exe 2904 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4912 2904 msedge.exe 82 PID 2904 wrote to memory of 4912 2904 msedge.exe 82 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3700 2904 msedge.exe 83 PID 2904 wrote to memory of 3812 2904 msedge.exe 84 PID 2904 wrote to memory of 3812 2904 msedge.exe 84 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85 PID 2904 wrote to memory of 2392 2904 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a312e4e4f46a46a9a159d9f92a53fa26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc199446f8,0x7ffc19944708,0x7ffc199447182⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17935411191090820874,15730489771059702713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD53d87678f854e2b25d81aed409f195bf6
SHA1b8bc4198f99b603ea0100cc58667945345422b26
SHA2567ac5e7c047e42f95d1c10807db8502bd5e0e8343d8dea9c615bf60b3703fb89b
SHA512fb519a3f6b2892e31f483c2a820b77b3c0fad591e26a9ef6072939f24293d8bf01d2d2b2c13c7c27512099ffca5ec97ea806ffa052a6b62fa39363dd9b46d7ec
-
Filesize
6KB
MD50edb8d1212ec377c78257f9ddbf66073
SHA158336beaa8e07822255fc94d80d9dd022272e6ef
SHA25606b2e570e96e8ff87610ae3b2dec39614c81bbaab3818d7a1731c5c699c91944
SHA512857d1ed64e129e48bb4b721bc05c8df2f97733073c4c14a0509dc48d3d9b271ec8e33c663a88e6d68974710107cfd9b6352be06d8dfcf5289fd33fe4687722a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD518b2918fa8ea9a8d4e416796381c3708
SHA1ed733508481416c06723fc1e97812233f47b0a6f
SHA25678d1e7682de26df96754ee77111180f547fb39ef90318db542d101f8e02664ef
SHA512e84432b4d35056bbad80253de2d8b0715ff0f823c4a05ae5e4a0e80e052678d9e19542411003dd896fa0ca01f2bc7382ff7aee3c83d77517c73837a323a0ede4