Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
-
Size
205KB
-
MD5
b711504a8e18c5f03d82b179ccd8d236
-
SHA1
671192c2579954e6553bf3c3225536a1537d7bce
-
SHA256
98fc5ea8942eea088e3e5faa1a541d2e9ad38d578c3f2b6486ca04d8a06a374d
-
SHA512
28bf54686b9efcbc20db87e99ab105a4a7e993e52baa4d34a83676e9ebc2a75f4aedc6ffd28cd25d307dccc1f61b6bedfa8f1ae61bb02d49397d5dbf99b5d1cd
-
SSDEEP
3072:P7Xm6oH7yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:P7yesMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 1976 msedge.exe 1976 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3432 1976 msedge.exe 82 PID 1976 wrote to memory of 3432 1976 msedge.exe 82 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 3484 1976 msedge.exe 83 PID 1976 wrote to memory of 2408 1976 msedge.exe 84 PID 1976 wrote to memory of 2408 1976 msedge.exe 84 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85 PID 1976 wrote to memory of 2488 1976 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9612947988633602999,6749382346520643807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5e5de3a2b6cb053b0fcb5074aa4478ba4
SHA15eab33f09a5e95e5f9884d6fcec1b825103160de
SHA2560b87d08cf292eec679cc13ebd63eeef23cf294e2b51da9f082d7de5903c186a0
SHA512ae29bbbe11758e1e955fe0bffcb5e81c598aa8e6e19e29effb85a02ad9e81b85851a8bcbc3fb786ec83b3989426b2904918f8e678465e06b7a74a4d54727d8ab
-
Filesize
6KB
MD52a3d1c0dd6e8c520f71c2ad44c579973
SHA159808e400e1b451e5c63760c174008d8016cc14d
SHA256796b802f61a12ba32a3d13fb6a9b67e24b2dca57086942c55204fdd535c9395f
SHA512d7ec3dfb2a5259dbef3d933af0b17ef3432ea1b009e9985ac816b23e36ccbd52e56880a88f46c508d7a0e70fbb1d19baa944b80b728378b9e104975ba870faf2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5104a79ab452e10c2b9e4626a068dee8e
SHA184749cb59afb6de2c5d06ca1ababf3e3863a4902
SHA256f5c7d3d4c5ac32f2af9638f8b11d565393c3593bf895771a2bd6984aabc00567
SHA51261c4bd4cb6d44e0634dd510ee14f39bc6f60d26195ad54d92c122151d28ee0b2da5cf609c1eff570122c13796bf879f4f7c5a08672dc3375307c7f03a51fb424