Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
ab379300ce1f60d1fed4e0de4b353c55_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab379300ce1f60d1fed4e0de4b353c55_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ab379300ce1f60d1fed4e0de4b353c55_JaffaCakes118.html
-
Size
36KB
-
MD5
ab379300ce1f60d1fed4e0de4b353c55
-
SHA1
28dac1b083ee05ab40ff58de5c7007f9ec831e34
-
SHA256
70098b78a383f2ca0631868c47ecc55abb055bac06d6a5610d27985c5df5f0a4
-
SHA512
c6f040db78c9fa92bf26be61f52ea2999beb94ba54d4f0d9959f12a35860e00f330e395a6282cd7ac4e4dffc46f40f48935bc55cc2293f37e47bb2402e348a52
-
SSDEEP
768:zwx/MDTHK888hAR0ZPXDE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TDaLxC6DJtxo6qi:Q/TbJxNVAuCS+/y8RK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 224 msedge.exe 224 msedge.exe 3756 identity_helper.exe 3756 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1292 224 msedge.exe 82 PID 224 wrote to memory of 1292 224 msedge.exe 82 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 2120 224 msedge.exe 83 PID 224 wrote to memory of 1520 224 msedge.exe 84 PID 224 wrote to memory of 1520 224 msedge.exe 84 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85 PID 224 wrote to memory of 3164 224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab379300ce1f60d1fed4e0de4b353c55_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfd7b46f8,0x7ffcfd7b4708,0x7ffcfd7b47182⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4953905785747084863,6148676207166628703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
614B
MD592011eb13108c36b8c0595d5eaa990bc
SHA10c7f95290ef7d9f11e20ebffc67a2b6d8008cda5
SHA25699af43c0f2f4873a8448ceb049661a564fcd8468e3978ccf8c2ae49ef9fbc61e
SHA5127201ab28400c5238dea55b3e0866a5ffce0e5d8ae17158a7b240a6a1a9e8cbbac91e6ef1125e2d93ff896ef7470570f5f64f2c6b0437ae45b34339ea5689012d
-
Filesize
6KB
MD546f50b682af69d076718d52ed811af8c
SHA11bc7631776158a451c80adbe58300d3e311f2171
SHA2565c140882e46387531af3e88768c661a41dbf56d85c4136fc1949bb65787a2405
SHA51205dc69c88462f86659cfa08c807a3c92802212245eb053cbe0d289dbd62c22be91d773b28569b84e114c77e343878e95a5d057bff4dd09cd8a1c8679bbab23a4
-
Filesize
6KB
MD5672d3017027f9b0daefa1cb02d69e79c
SHA1da6b271ac9dffea3a525f02ee7f3361e7594a7db
SHA2562a9f6488934e1c8890df992eba08a15c83bcd78c1dbbbf903cfd7ac332e0d6b6
SHA5121404fd8921b57b20924de2235354ab1d1e5d0e14c617d8b55b5330391f18146f61da20c76b72063c90858aa65f4bac419654d1ab4a7253fd33238c30ad045fd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5db804cf33b1363eaa67f5e252b2d7fc2
SHA14e8560f5aa38b8afdd3ba3822ca45930bc8ab96d
SHA256bea51fea2b613b989b0c2e660b09d3c60928aec9db19edc611f80f2a28e15451
SHA5122affd7c53300562c8d9a423ac354def690502a5d2c4b16b201d37f0700dcaba6a795da9612772b5a734df1e5c7873be5f021290d1225f90d462a6d312a23c1ed