Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
-
Size
53KB
-
MD5
5b7de1ca7f6f0ad1f786f9bbb3e8df79
-
SHA1
c2490ef8826083c130163e69b155f523283487f8
-
SHA256
19d9c7a5b522e8e1b55e759d44c3019be192cece460f0f0fda2376ae1a3362f1
-
SHA512
76170d6c51d714af233be58bcfacdeb14c3c053efb1217306f163ae479c571f243e42794f93a4943b978b75aeb2cabd42f7c8dac76e791e7667f6cd1dcf97825
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlYe63Nj+q5VyvR0w2AzTICbbsoL/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUkrunlYe63Nj+qd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 3924 msedge.exe 3924 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4788 3924 msedge.exe 86 PID 3924 wrote to memory of 4788 3924 msedge.exe 86 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 876 3924 msedge.exe 87 PID 3924 wrote to memory of 1728 3924 msedge.exe 88 PID 3924 wrote to memory of 1728 3924 msedge.exe 88 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89 PID 3924 wrote to memory of 4760 3924 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff404346f8,0x7fff40434708,0x7fff404347182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13518667869318097194,8892773573554805000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
403B
MD56d590d548d0d1f17537361fbaa545609
SHA18bcca4b31af907a3161e582f144010026ab9b216
SHA2562a8027a23688608c0059c416bdef7175aaa5a6eab8da78b27b2db813b07acf07
SHA5120bd528a022f30469c31d862c233aeb4e9ad51dd9270292b31d66a299cb08fef859ac58269787eb58917340b4584d108e46e1e1c078ebe4709cf2bf953e01f4de
-
Filesize
5KB
MD59baf2c0dacbe1e848dadeec999d66857
SHA13183f3f6c68340e9351c8f73fc1534cd33ec44d8
SHA2564e4497572c66b8c4731888b1eb84b1661b67718d3321f6f6d8a19057aaf6457d
SHA512d8e47ec67eed07d46cdac5c003d20580a346334918297b24d27e412b6ab054dcf2693178a4609040e3cdcb8b72978dbc3acbd2ff02ff481548a24bfdf78d59d6
-
Filesize
6KB
MD5ddd7847dc9078216e5250494b2bf28cd
SHA100fc1e87aeb8ea403d52550b32fe9044f48526b9
SHA256b544e81966f7ce1ef4a9a585a1aa137122d9f713d9e0a36c11c23a3128b2d7ab
SHA512f22262faf8c34b1d56c17f9b223b0513303eb3e77e031db3d2e0b6dbbea0341eef24d598dae29005a5e367fffc2a0a75f6ef572754057711e285614c94d23514
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a9c2ccd285727ce8381cb622d60418a4
SHA1d985a26675c3084fb43a0e06bb6f38a4c093170b
SHA2567e73a53ab55573adc686ad3ff8cc14f8d58b0defee98ebeff7e5e7298a6817d0
SHA512681521cf11d39a3abf1258f855de0ee3e1d37813d98ddef24a335e8323bb5f7ac1234fa2e741491b299bec1d69228f998938df95a5e7596c17ad843af9862d89