Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
a90bb2673a32ddc5afd302d8eefecae6_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a90bb2673a32ddc5afd302d8eefecae6_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a90bb2673a32ddc5afd302d8eefecae6_JaffaCakes118.html
-
Size
22KB
-
MD5
a90bb2673a32ddc5afd302d8eefecae6
-
SHA1
e0ebbaf47d640ef33d0bace665fb3def2d3371af
-
SHA256
710e85855ebb57bfa6bd5568a556d0f950ab860db2ac06c596f4fb0fe6e6cab8
-
SHA512
0c7660cf9c40f8e520b357eadc4c8781898b22eb4dafdeda04c3026e5be28942189e2645a93d027779badc4e3f9a2055a71b8be7f5d75bb9984edd90a67c50d8
-
SSDEEP
192:uWrFb5nk6nQjxn5Q/onQieLNnSnQOkEntQ6nQTbnFnQgCnQtzwMBrqnYnQ7tnhnl:YQ/1NM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 744 msedge.exe 744 msedge.exe 2248 identity_helper.exe 2248 identity_helper.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4756 744 msedge.exe 81 PID 744 wrote to memory of 4756 744 msedge.exe 81 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 4312 744 msedge.exe 82 PID 744 wrote to memory of 2308 744 msedge.exe 83 PID 744 wrote to memory of 2308 744 msedge.exe 83 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84 PID 744 wrote to memory of 2016 744 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a90bb2673a32ddc5afd302d8eefecae6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef34646f8,0x7ffef3464708,0x7ffef34647182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4834213372582625224,18057879375211246927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5c1e1b51a1c670070cfebc9252b6ac0d0
SHA1e92c2964295802f9110adcb4512478b0d510585a
SHA256ac6787fe33f30b7897b487675d58f5921e16d7a768d0764aa5f63467597591cb
SHA512619f71ec0e32feb29404cabac9cf15ebe5ae4eec9dabad6a0529c3bc8e56626a5ababaa311be760ff540f53bd052d52ceec42076fbe660af97a16a054d01f764
-
Filesize
6KB
MD585fc84cc7a6ab88ffa37088f6d8e8fdb
SHA14789f830c71bce5628bfa25d4f7eefd3748de2be
SHA2568b4358ee9077f9e98aca93e27de8fd4dd79d851ea0dd6ef943bcf86e839fb84f
SHA512eff3f60a80fb3cba0c0c3a4ba29f97b0c0e0c49fe055a5062c70dd91f2b3ebc0f6a1312d7f05cac1969795318ff26df21e9d34921887d727c6815775a580db75
-
Filesize
6KB
MD5f687b6b0a704041126299c62e91152a9
SHA1eb34be76afddd70c4cbd9d8ca5112fd4466b6c22
SHA256414f49c51bfb69cf44b90ea11994ed148b45c6f58cc679dd29c988cb41743a89
SHA51214f5e8b231ba470cccc73731238100d6f6073a40cd126e778e31800f0ca70474926b41793cadc9cb557a295aab94a6e818e9bf7c80f72f2e0846122c50606454
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5608b219b98279a57c80e364e7d1e13e3
SHA184dc14d35967b46e5ec65c67f3ba6cf5799d68b7
SHA256cac94bb8747ffbf66a60d58b5bb0f8e80ba7ad9e0ad43bda09835b2bc2457f9d
SHA512bdb5671274b0160c55df1a870b3c4f2848d8d5ca87d9f3c715c5b4e56cce064cf7f0b2fa0914a04ff85daedf842bc2391379e15ad2d293e8098149757656a2a2