Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
b256ed8a69b5f3a499cbe408216ea27f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b256ed8a69b5f3a499cbe408216ea27f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b256ed8a69b5f3a499cbe408216ea27f_JaffaCakes118.html
-
Size
100KB
-
MD5
b256ed8a69b5f3a499cbe408216ea27f
-
SHA1
1f61219063b052460778d73c90eaace68e2ae480
-
SHA256
43c9eef22fffd7c8c7cc785ebada31ac1edc988467b6ab929251af3719dbd4e1
-
SHA512
721db780bc0a0d1586389cadafdeace220fcdf3eac16e0f66cb071ae6e5eb59111e7788315c7d50b22a62f2249335fd8f0e29248562148f3c7122ef5b4b9f143
-
SSDEEP
3072:lqQ2tMYnu/TZ7MbnuDhYOMExD0MiwTnFiKJBzLZGMzMsUR5BeSawdGgRqP9qpo:lqQ2te/TknuDh3xQwTnFiKJBzL+sUR5U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 1624 msedge.exe 1624 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2148 1624 msedge.exe 81 PID 1624 wrote to memory of 2148 1624 msedge.exe 81 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 3468 1624 msedge.exe 82 PID 1624 wrote to memory of 4544 1624 msedge.exe 83 PID 1624 wrote to memory of 4544 1624 msedge.exe 83 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84 PID 1624 wrote to memory of 4908 1624 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b256ed8a69b5f3a499cbe408216ea27f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1732 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1772074090451758546,13017553600429076371,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5a306b0a13b68a02e68875aab67ed1bb9
SHA1ee26afa44445264c0fa2b71bccf21f243af11a48
SHA25622fae103cd89b64f25f9edea36f17f3d7e384503422d3b6e51904e4a29372ae2
SHA51227e60bbb082afb59551b5122da7cb168062c4099578b57405d9b5bb14b6701b82dd716c3dd0f312eb8560c4d11a487f761188dd764e71f757fe2c0f1e78a3416
-
Filesize
6KB
MD538accb65cae48719fda056b80c1a6a9e
SHA191d807d56a8593ac24f3c6f6a91d56d1a6875837
SHA256103ea44c367e20eb6be1f124b89d20b324963695f784eb3d3c309aedb44c132a
SHA512fb87aab694d10c8da0865e7be6ace3de3d493fd01af5dd07db04bbd60ad07cf4dbb4b33529fd45882a37e7a68ef1cb17a8c23545f6d0be92b26c6e0ccb5f3404
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a27b3be81636d69bfe67ff98ade51ba7
SHA1193fbf3be7f2745dd0dd0f92a96aa4881efbd980
SHA2563de0bffc0b1b056ed7d971d7a357692ab5d45985d37779ef7cd14dc3b9434daa
SHA512628e97586bfa994577127afe868c7479eb8dd63262fa35e8cb05dca9a61a74aa2e4c99672e53fe2b2dc726f57b9190058a06eb2fe1c9a13be13d3a334844ac06