Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
b1da7c0013d0c5f9b22762dd037c1b8a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b1da7c0013d0c5f9b22762dd037c1b8a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1da7c0013d0c5f9b22762dd037c1b8a_JaffaCakes118.html
-
Size
45KB
-
MD5
b1da7c0013d0c5f9b22762dd037c1b8a
-
SHA1
e16de6d50002436c1dfb3ffdcb4e195d6d44d54e
-
SHA256
158c43d7a9f8219ce93d3757465bd52ecf43f1cf053be560d96dd671072faad6
-
SHA512
9af4ec48e7c5efd9c3920bc33f76a4560911b3d5e106beab626adc7b3b60840cf2fd513d0b82123ad9d46b10d49f1da824230d7b34618a14e2306f6df4341864
-
SSDEEP
768:4LIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZrA:4LIRIOITIwIgIiKZgNDfIwIGI5IVJ7Su
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3756 msedge.exe 3756 msedge.exe 4276 identity_helper.exe 4276 identity_helper.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 468 3756 msedge.exe 81 PID 3756 wrote to memory of 468 3756 msedge.exe 81 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 2020 3756 msedge.exe 82 PID 3756 wrote to memory of 3944 3756 msedge.exe 83 PID 3756 wrote to memory of 3944 3756 msedge.exe 83 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84 PID 3756 wrote to memory of 2028 3756 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b1da7c0013d0c5f9b22762dd037c1b8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb7be46f8,0x7fffb7be4708,0x7fffb7be47182⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3624366224221919447,5345943855946077266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
387B
MD515364989c2feedd06e779b07ecdf3a32
SHA1a7f7f6dedaca8a97a2d1033219ce7732225d6853
SHA256e5da5135f65338761d99596b176bff9b9c4358a1e25f1bf7dac19cc560c4e47e
SHA51275f2c8f2fa7a7aef346bf12eb793721382889865d6e5caca415fb145f8ae9105645a1f68536654869af04996e449619b0f4c821162f1de0b8b017600abfbd5b7
-
Filesize
6KB
MD59cbefbeb93e32aa7b5f58f0bb9f428db
SHA1fa3bc34e2743e4668f2d235f216855dba0a35e5d
SHA2561cdb621b0721e5c512cea22f8c81e86a89b63f7384cd9fbd1574024fe3adb051
SHA51277b8cd1990d20f534d624dbe9d4770ee26756b2742f149fd01feef2c54a4a473471b8eb6e386f4aa2b505f21cc4804473c21244ea82e1d59392ecf86937e12fb
-
Filesize
6KB
MD5c3c131cbc444ee3c66c79f0f810e4f8d
SHA168042af1f4bbe8e889a8901a37ea9d0316003aff
SHA256406ad851eae7030309b195f70c0df934d813cff8c4e6a8b052cc6908ecce03da
SHA512d407dec42b57ce277446105813d3b33b1f673ef22eda7dbbc2e5ef59d250e1a148707136555db1b9f28251667e1892a4688d4d823e4f7a862038c3a604f172e6
-
Filesize
6KB
MD582d482088a5387eb1641cf5e5ab983f7
SHA12ba80d12ce472b9cb7d12bb6881e7a6f8eecb6f2
SHA2562d91eba7bb2dd29579774dd3afc24c7f5fc1e56f396d31d585a3515fa5d01cc3
SHA5120392e65689a5dbe4b79f6ec3aaf4e94cb0e13a9a0fc3201efea929ffe547672728750b78c862c1e513d2bfd33dd1001a99dedac427800da192763838cc659ec9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579f437db40c504b881e4f83f85a77cf7
SHA1b867ef2f2a7470974498f74de298b6615c5fa426
SHA256d4d0a99095c99a3ccc81f604f860ccf61e63d9be9c5c50cb609ad63676176623
SHA51209bd799eb1ad135374ed0b933a69e8d7dfc4cb9a9a9dca140b66418e438a0530c7fefd3f5e7b33fa9d83a44e35400ed7c11ea1e4b935dd1ba4d28a08e1cda98e