Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
-
Size
53KB
-
MD5
0bfca0e17332f73ec9b91ec6a54c1392
-
SHA1
beb6f102b7b71de089ab6f77275c938e1c796622
-
SHA256
9a62da1ce3227e6c3b966d87df26e13615cdb77832aeb52c55e31f26a3a5434d
-
SHA512
b76127a059ef7b2190bada2f6c49f6330954d7111df4cac6e354f5ce3f7c982f019c6c624e272b868eeaf2559da0ecce0724f70729c9386ce208bf103f175b4b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUerunlYA63Nj+q5VyvR0w2AzTICbb3oV/t9M/dNwIUEDmDA:CkgUiIakTqGivi+PyUerunlYA63Nj+qk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 3620 msedge.exe 3620 msedge.exe 4612 identity_helper.exe 4612 identity_helper.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 5004 3620 msedge.exe 87 PID 3620 wrote to memory of 5004 3620 msedge.exe 87 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 2212 3620 msedge.exe 88 PID 3620 wrote to memory of 4100 3620 msedge.exe 89 PID 3620 wrote to memory of 4100 3620 msedge.exe 89 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90 PID 3620 wrote to memory of 2712 3620 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b7446f8,0x7ff82b744708,0x7ff82b7447182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,11213195681146665032,4582830562855353697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
402B
MD5b98e5a0b94e28907a1aaf460112c41ce
SHA14dc264d8e6226a0619ddc2c10ecc281966b92101
SHA256df1b8c2e73f061ddfc57989b3d3c9772f9bd3b9fda7f4a38399ee9f1b37d882f
SHA5123da15025e59a514773dbbfb98667a14419e42d12a7b1d821c04dcbd3730fc17247cf7ecff727c1d8149c128198df98854a0cc9e0ae3f14d5ee0363dd4aac2033
-
Filesize
6KB
MD5a622ee0e6e8b554c2da1887b5116d537
SHA11693aa36ec5247f71defe7c25273cbc87133f84c
SHA256efb227665f7c334ac7653490d1f9c65ed7dc9629d2cfb3da0641f5d6deaa7313
SHA512e3c713482b1882d759eb09be52350a4d49f37cc1a90bfd0576853244139221f43d3ccfae5a0f11ba3e6d1ccfd86fbb19e9d9fd68984bcf6cb1491ba7c9a91e41
-
Filesize
6KB
MD5889f3d73882b16b3e6bf7435607b8f9e
SHA1663d8eadc5f54ff82d048a53a79d95d01c85cdda
SHA25685f9c2cd3968066587c4c2451e39c43e2d397b0a2ac75f79b1f204fab35b51eb
SHA5120ca1a60b243a5193a0306f3a4e3dc01dabfce29c49d2dc3c946b9032216300f62654724332966411ff14758228ab126dc35966bb631375eda0d554ee85ea6f4a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9601c826303bd19110e125dff9a437e
SHA197926211557a0b0dcc8871b7a67175a8b3381f47
SHA25654545a42497af6c8cd8186068301a40ee23ecdc220de498df15c4644a21c8e65
SHA512239fa65312a9385d329111735a584ca5094ec15e1d1d0c842a741f110caac0153e55f9436d93ead32fcabbe7816a76f6a34678b3a2511739f4f07a253dd52e86