Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
4305517a338dc0e8fcb31a45aae122e7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4305517a338dc0e8fcb31a45aae122e7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4305517a338dc0e8fcb31a45aae122e7_JaffaCakes118.html
-
Size
73KB
-
MD5
4305517a338dc0e8fcb31a45aae122e7
-
SHA1
3b87b9af5f4172dd05058876721804f5c650e2bf
-
SHA256
58241b73463f97ffd39964bf279e8e6efe8934b631c42fc2023ebb106b78edfe
-
SHA512
71f45780c970e42fea3baf7ce0c60c96e93d06e48ae05f97988d3d1c00b90da4a7b3d7b9a55b3c2a366f0ec49d506ae4a35c536618b2bf1f46127ccbf9ba8009
-
SSDEEP
1536:7d1kV9sG+AlgSvSMqrGjWLX6iTnQaHWrvWvAgSS:h1kME+SasjWdTnQaHWrOvN5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1568 msedge.exe 1568 msedge.exe 3992 msedge.exe 3992 msedge.exe 3032 identity_helper.exe 3032 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1300 3992 msedge.exe 85 PID 3992 wrote to memory of 1300 3992 msedge.exe 85 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1004 3992 msedge.exe 86 PID 3992 wrote to memory of 1568 3992 msedge.exe 87 PID 3992 wrote to memory of 1568 3992 msedge.exe 87 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88 PID 3992 wrote to memory of 556 3992 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4305517a338dc0e8fcb31a45aae122e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e4ff46f8,0x7ff8e4ff4708,0x7ff8e4ff47182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4177272847618454015,7487434361005088171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
6KB
MD5337fb9ea17c6df69e0d8ca61e408504a
SHA1f32241744f8f07478e9aa060999213b97afa939c
SHA2564d924e89f8c2dadb8b20bd395496bf746c02605dac4eb6af2b1e606c633709e5
SHA512b1fd8e5a7f4498947bf5b196d2750bd095ebf574d2fd6229d06f9fddff3091794065ee22fa7c2525e4fb56d75a1093c070ad4c25999389a77db3380de7f42d92
-
Filesize
6KB
MD59f13854a1d4f6e41bdba9a72cc773f7f
SHA18d39175052bfad4a658c48dc6263dc5006294ba8
SHA2563378d64de1834d85149805be7914d7abfba113f728d9b2e155a10b954842679f
SHA5120c73879a88c08773128617e4bed51416241b5ef20468fb6b960d3b8c0c51ad2a9e40892d4125e3d7e60d76f4acb9e68f269c1fee16fa190cbf48752583f038fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b892fac5ea06627ecb3a4f826d7ea5ec
SHA118f81eb75bf655a3284a8b51963fe61e2b62e46c
SHA25682c11fa6b69ae05170606144dd27e750eddd9464ab55b2147d900cf2064eabca
SHA5122fd4c8e289826d9ff785bfd395fa5da80d6bb2c4808ae48acfd9c72a0e1595ff5e8e5c7355b416ffc3b966caa84996fc9a75ea6429f5e4b0e1cb710f46b558ad