Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
b252dc57da099181eecbdf6fb87f182e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b252dc57da099181eecbdf6fb87f182e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b252dc57da099181eecbdf6fb87f182e_JaffaCakes118.html
-
Size
40KB
-
MD5
b252dc57da099181eecbdf6fb87f182e
-
SHA1
5482abd8b1cbacd7cefb7483ad694ee55319638d
-
SHA256
f0e0054b9604fb76c3090cf90aab1d35cb79eec6e14c30dcb911b1b034ce2e19
-
SHA512
c7617f19ea23b80bb64a4d5fae8ee8bb93b9efe91e05f9869a22c97583f217971259b0f1e046291356ea9cf2613c6dd64e8a024edcf51270f39cb242210016e1
-
SSDEEP
768:b6NMb3S2d5Dh6QRDdSlklxKRAsve0/evnBAhAQza84ndxN4TlrG9ifcnpYRmySyf:bERAsWFJeAQO4Q6SexXbezeSeuw3rs4x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 4388 msedge.exe 4388 msedge.exe 2396 identity_helper.exe 2396 identity_helper.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 5008 4388 msedge.exe 81 PID 4388 wrote to memory of 5008 4388 msedge.exe 81 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 1568 4388 msedge.exe 82 PID 4388 wrote to memory of 3008 4388 msedge.exe 83 PID 4388 wrote to memory of 3008 4388 msedge.exe 83 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84 PID 4388 wrote to memory of 2680 4388 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b252dc57da099181eecbdf6fb87f182e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec8e346f8,0x7ffec8e34708,0x7ffec8e347182⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2192 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3656297989287659929,12558026404130422918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
456B
MD527cb30ad1a00f8f0e63b2f8d23da65df
SHA111542f28b323a2c49aab7ba234e1ec8ab3f6f0b9
SHA2561ab5db9a788179bca9c45bbc923009d52776eecfe1ae599f9442a7b30a05b7bc
SHA512f0021aeb07af580771f5c5112cb0ff27531f09ceb762a997e1f97e35e948c45bf61aedc304ab83023e684c47f149aa4d8c68a1a08ec3fc120e3e7585cb084fca
-
Filesize
6KB
MD57db19958c43d4b69ce859928ca66d2cd
SHA1bd72a632c6c2999edf4ff311a8799bb2c25a8c4a
SHA25637ce89c4857a8d514fb318f0b20d822267c44efdb67428426760ce46a68497ab
SHA512684609b5fa90e8f6023a445143e4d6a850704fca852cce795078950bc142d92504449cbe19f848eb1cdc81df5ee04623cdf3945903d359eef16d94751eaf2e8a
-
Filesize
6KB
MD516090c5c9886b6bc892228191ec75acb
SHA1be39b30e8b21996cb2fa84d6737d0449bba1d27e
SHA256cf43311a3717156dad806e1db3d592b4bbe9d1592431215fd7370e9beeab8e8e
SHA512dcf0b86a657f12ee0707286ca5a19c85b79dfffa5fd8b2e9cdc26c74d5e8bd812635853fc7b003be0f6dc69acfca16b4ea25170073da9d4520d516e12bcbdc2f
-
Filesize
6KB
MD5eaa8d3a2ff624c3aa0ce79e01a002297
SHA112210e69de16b6261823104a2ffa9c4180e14d1c
SHA25673372c931660a00ad031702904863aad40dc171a2c547cc4fad329bca2d8e983
SHA512d040ae2d61e8347f3e3a7a899803bf219849e35fb52c44c093144dbf775a8ee09100e9956222c569c3fa79837678b419784d1d31b77d6b223e19a40df8714363
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD502757d76d332ebddcf7dd5135c82f8ca
SHA11ce7382713d808bce4ae4b49d0cfbcfdb7c562c9
SHA256fd387aead9de7b1f9b1ef7ad5602e0b88904ef5fc7625e00d78bda96ec1b4ff3
SHA512f7bbd2ba98e1c041ce11e96e1bfee49358c46efac5161349c1d1654382b4a371ab42164ce108b9051ec4e798c2d92b1c42eb1970e9441d9f0e58e728cc8f59f3