Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
b4280c696c6b50ce9dce34d2af35e8da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b4280c696c6b50ce9dce34d2af35e8da_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b4280c696c6b50ce9dce34d2af35e8da_JaffaCakes118.html
-
Size
31KB
-
MD5
b4280c696c6b50ce9dce34d2af35e8da
-
SHA1
b701473dc6c4b713a73fe693b84af95d05af08ab
-
SHA256
159572264f94f2b5f718a96e9f9607c3c5959def117d9a313b312d774a3446d5
-
SHA512
29fe17ee6278a1f35ae02848cb784a713f00d3134448960ea84853b02ea63d7829520091d4507dbbf9b8a1082af304a94f52e78c20f1eb8291fa4274294e696f
-
SSDEEP
192:uwLlb5njynQjxn5Q/znQieqNn4nQOkEntFJnQTbnFnQmSZxrbY0RG3wtcBPoaHWs:jQ/tmxrWwsB214pQi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 4492 msedge.exe 4492 msedge.exe 3852 identity_helper.exe 3852 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 884 4492 msedge.exe 82 PID 4492 wrote to memory of 884 4492 msedge.exe 82 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 1932 4492 msedge.exe 83 PID 4492 wrote to memory of 2636 4492 msedge.exe 84 PID 4492 wrote to memory of 2636 4492 msedge.exe 84 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85 PID 4492 wrote to memory of 4380 4492 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4280c696c6b50ce9dce34d2af35e8da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8554b46f8,0x7ff8554b4708,0x7ff8554b47182⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5470987250065253849,14486628420434553115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD551325623ac2ad4033631da76b5e36d92
SHA1516632043f583cbcf60daee9faf4ba1ff33388d3
SHA25658e44f62787b5495eaa3f29d3924ed1650741a21c13cc8de567c12930254d76f
SHA512c944146caf0d6f355eefd6338fa494bc591f1afd21ae9d2b1b95f5cf0005b5cfc0f491aa961f00da7ab9b9a0e710bcf244dbc54803737d5000fabfcc8deb8adf
-
Filesize
6KB
MD5f6d296e67201d2c121145a53d78b09cc
SHA17b8452f2feab06c3b67484a284f36976460e2b33
SHA25679291b35c8731c657f668c74d2308ae67e40bf0f2c05751fc018abfcd3f72b3b
SHA51212954e0896a8c0b8e803d6c2031afb38821725d6044b9f63795d9d8f9281e731f418efd0aaddebde0b12206e43255613a35c9b4dd2c05befd10cd0ef9715a0c4
-
Filesize
6KB
MD5c62ae7ba3eb69de0036c719fc9782f33
SHA16da643bd51844d836cf13e1fe52505e911d49d53
SHA256fef525ad71f6794c96a0e2fac39befb9df5e10212de06f776722016d9493aab8
SHA512d6fcbde97b2feb0c4d3d899eba9ad130ffda015ae36c498e25064edcef64a6aa3be2b6a8d9f34bdc75e6d2d65001c435ff42bab2c1a74dc304cec6e7d6b6eae1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD555cc719f39cb4c121e2051b6b49b324c
SHA1400d630ebf37fb909ba4be75ebf75e7ff77c6275
SHA25658f1506b471457216a0ed34db7e62eacad5333aafbc9d897dd61ab014cc8efb9
SHA51215cd61fbb727eb84fc5f8acd0130b9eabfec99906360afb35a1a13d01bb44378b488dec43e148a94f3077eec87faeffe42e9f98ce9496dc730a6e2f0c18b9592