Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
b7cbb8127d6786390fe9f19c163598cc_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b7cbb8127d6786390fe9f19c163598cc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b7cbb8127d6786390fe9f19c163598cc_JaffaCakes118.html
-
Size
118KB
-
MD5
b7cbb8127d6786390fe9f19c163598cc
-
SHA1
b9b934db6eacb7ec20a2f9f20628694f6cc60bdd
-
SHA256
adbb5787b15b61dc947f991e9d26d302904a77ea44cc15d424e30f7434f3cf98
-
SHA512
a9be7f84a92fd1d6bb8c47e3ad8a06e70d21bfd029064889b127068a09dc08b2478b300da455f2955db7c2a863f0c47fa6fb3cd4e1e0eae354fa6cbdaa13337f
-
SSDEEP
1536:SLzesHkyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:SPesEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 464 msedge.exe 464 msedge.exe 2748 identity_helper.exe 2748 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4168 464 msedge.exe 82 PID 464 wrote to memory of 4168 464 msedge.exe 82 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 3056 464 msedge.exe 83 PID 464 wrote to memory of 1652 464 msedge.exe 84 PID 464 wrote to memory of 1652 464 msedge.exe 84 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85 PID 464 wrote to memory of 1264 464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7cbb8127d6786390fe9f19c163598cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13990432856761637150,1163425586035742037,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD580987c73fdbee84c6797ee7d4aff8d99
SHA1d2b2a7b18c7aac278e14b7e5de35bcb75d4dbac8
SHA256a72639655ade8a83675c65933b93bcba8d3fe0fa8cc7be5cf7658e06fccb53a7
SHA51285fe6a6d1bbbc7dcebb205c3234553ff8f192b9c9ad9088c81736eb2258913dc4cda8af10e2cd76ec2815d6673549a8257981eaabcb5de0a27a93ddaf70ad5f1
-
Filesize
6KB
MD557b8c35fc8307bdd72e5b46c0b124d61
SHA196da532fd47cf994a8d3625cf6fb8c274d0f9e1a
SHA256f6e6125ac379f5bed21189464457069394a0254548c85374616dca6e67717d86
SHA51200ae584bf8485c59fcef2ed871f885ec41d921e0a8c9b4c4f7f5f8728fe57f886420b3af67fedb698df18ba4a2de2c130828c7e584e3aad1083a9ee295d6d230
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a3ec34bb165082197619e9e4ba1df938
SHA1cd184fa4e697cca2724b54f3547cfc6008abe25e
SHA256c30f4ecea9366337becff002778f3022f72e700b34dfe84de2445cf802cb229b
SHA512a6e1dfc293fcac0e5f6a9a3b3429a56bec7176831ce5d0a20418da2a7295ea1dab9ee355155f8e23d23919aab6bf90bcb7a2acb26d8effb5b3c3bd9914bc3aa9