Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html
-
Size
18KB
-
MD5
b158852a5c7fe67905596271d4d7863a
-
SHA1
a8e9b808b80bfe553dd97bb30b485da383b6d78d
-
SHA256
245c5f992bede36df819b60e35dd86538f9e19653405386de0790d7429338489
-
SHA512
c6e4304ebdcbdb4b81d4b6704a0c066d8fa5225aad043069c7e615e42c80b56096f6123704adaeba5966f9eb64bb2c5fa8487f6a6c2aa691364e7b9b6adc019b
-
SSDEEP
384:JIXasg6ucujpzLmqj32UNZ6/jIBu8NONm0dhgohNPjlK3uHYykKb8D5:6Dudjp3zj32UNZijIaJHK3uHYykKb8D5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 60 msedge.exe 60 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 60 wrote to memory of 3492 60 msedge.exe 82 PID 60 wrote to memory of 3492 60 msedge.exe 82 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4548 60 msedge.exe 83 PID 60 wrote to memory of 4332 60 msedge.exe 84 PID 60 wrote to memory of 4332 60 msedge.exe 84 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85 PID 60 wrote to memory of 4708 60 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b158852a5c7fe67905596271d4d7863a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15213129602938566463,7351234713721030172,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD5a32417b80e5ae3f0a7b60315f0d24917
SHA1038e8a7201b5b1c35dcd7d7e2895e25207596c29
SHA256e7261697fa96bff162cce7f9fbc71422dba3e5f49ae6599d8c1b4bdc8cdd1ecf
SHA5124ca45d7eeec0f96e7f50325ea43496965ea842f087fb1aeca2f8fb842ce3c204958a503382dad31392d81307e2c90b939df508e70cff857f722549c3dbc5d32b
-
Filesize
6KB
MD5b9f7715ea3297236b729a010e2f125cb
SHA183529f27d0d9da60c724e884bf0815c8702c0240
SHA256839a209da595cc706c3374a3a6871b0c3efe1593240ea493b3e0b57622a998bf
SHA512b74d884823bfe15a8522c3cb5ac9af0b10fcc2a536cbf7a7b764bdd1b20967a9fa6bf3e8873f63926bf21a622ed61c4736cf9ca3706d000dd268e3e475852920
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD54f03dcc7133c892157d738d9b1494ae1
SHA1aad07208e70671078af8d85baa377750f67fbf79
SHA256fd32dc9199448b78495c45e7ef2d27e95abe1e1cadb070a74e2bd9d81ada8fdf
SHA51215deb60cae4315664ab438feb6415060accc02b3d06d57001ea54df0adcbabf62f1144d8369e7fc908b2d624c9fdef5207b72929a4ef5406e0ea6b0c408df927