Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2773808e5427c3f80d91b5778fca5ff3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2773808e5427c3f80d91b5778fca5ff3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2773808e5427c3f80d91b5778fca5ff3_JaffaCakes118.html
-
Size
1KB
-
MD5
2773808e5427c3f80d91b5778fca5ff3
-
SHA1
1545db850d8b4e7dba5983e4bc796da58e1b5cf9
-
SHA256
d9cb4737caba8ccd4fbc3c974654b245977f1e586b8eb49da101d151a30b4eb8
-
SHA512
04c497eac78529261adc8b24914ef33534a08d7c8b3e5e7254800ff764fdb9cada975a723e89e391e36fb80e13b2fd10649fe883c6afdb90390680eebf116296
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 4912 msedge.exe 4912 msedge.exe 832 identity_helper.exe 832 identity_helper.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 2724 4912 msedge.exe 82 PID 4912 wrote to memory of 2724 4912 msedge.exe 82 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 4920 4912 msedge.exe 83 PID 4912 wrote to memory of 3464 4912 msedge.exe 84 PID 4912 wrote to memory of 3464 4912 msedge.exe 84 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85 PID 4912 wrote to memory of 4876 4912 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2773808e5427c3f80d91b5778fca5ff3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9be1a46f8,0x7ff9be1a4708,0x7ff9be1a47182⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,4339489191928497786,10403927968190482716,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
Filesize
6KB
MD51d0ecaa7ea12cca8fe44e895f6e690e6
SHA19d38df02789d758ea04219aa3351b44005a238e3
SHA256d3ad7d918879be0d27bf74173cc30c93680ba343746b7c80828d3627e6a5ec55
SHA5121d007f4cae1cf45e04a637e5252ba0a53704c42a77ae52beba77a652cbc971fb7d34d76a544d85586d842aecbac5b1108839fd376cdbf28bbd0c4ff4e0b61afd
-
Filesize
6KB
MD5cba7b219a36248cdf55f88a1afaf262d
SHA18e533e93a445a58c70bce3ce4cb84544d6c9aec1
SHA256121eef4b87ca40e621c57e842f1c79a2828b0b38288817eb244801cbffa7c8b1
SHA512ef8699a495a37a12d0625bff91b3714cdccb4d1021fa1609b65d09299f61772e96b3fc76e0a990fb9754d8e19d1ee647db5df99c74ff5cc7439c30d85a105be3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5deb18920f52527aa2e5d0d64545adfeb
SHA199fdaceed6ec50846d46627d6af2fd3058c241c2
SHA2564cead88bfcd4ae04eef361b0a4f1a68b1a858f1df3ab08a66f68d5a3c66cb3c7
SHA512b851ddc6174fc2bb87db1a1ed2382423456339dcab2a144fda43bc19669eee522ad9df4f8be4be1b2f67a063536b3b5811b860377f268dd49d4496ff730ea555