Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html
-
Size
9KB
-
MD5
82256a2ac6f0985b29d40807ccd68d26
-
SHA1
e3c12463aaac30e6f9d269895fa786bbe8d4d219
-
SHA256
a0648e62e4ccca8565f26d85f2abf3d7ac9dac456d97464ac2ff3740d869bc81
-
SHA512
d377b54a130afece0c64049c01e9d4903eb7aff8526da5ad62c0e78bd0ff57bba2032107b7e3389c8722f1d6f5929b596031e99420d891027f831e0976c67763
-
SSDEEP
96:uzVs+ux7WHQLLY1k9o84d12ef7CSTUBGT/kPs2pUlVHcEZ7ru7f:csz7UQAYS/IRUPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe 2528 msedge.exe 2528 msedge.exe 3584 identity_helper.exe 3584 identity_helper.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2072 2528 msedge.exe 83 PID 2528 wrote to memory of 2072 2528 msedge.exe 83 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 3064 2528 msedge.exe 84 PID 2528 wrote to memory of 2212 2528 msedge.exe 85 PID 2528 wrote to memory of 2212 2528 msedge.exe 85 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86 PID 2528 wrote to memory of 4420 2528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\82256a2ac6f0985b29d40807ccd68d26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff907f746f8,0x7ff907f74708,0x7ff907f747182⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,566398327457631901,4804116038003840863,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD594eddc8c760c6582645d582b4f107cca
SHA101860648fbebb62eadd53d3bc58471df3b8d211e
SHA256710d6dcbe48115aecea88b0a8c0124f5ae5f30225e59dde1bdfcc4574b5e5933
SHA5121cf9e561257755bbf563df4f348bba14ffbce2faa7cfb96738dd2aa4b166d1ddfee114578f8b84b4d7c59f3d18cadd9ebc5b45557116bf68c2eda0867d9e5484
-
Filesize
152B
MD571a22f9fe81453c6c788bfe09ab8fe0c
SHA1f4ee9368e5795c5b3f9470e0434358170e7646b6
SHA256ca6f5b89e7361282ace0d96bba28c2a4434ccecfd0a97d925e9bc61524efd908
SHA512a36d9a0c814d4293ae70a62a76e8a98e712ad91674a26cb3d8ffd300e22a6cba134e501b4a7e742229a66005db3b508aa821abcab1347b05457f06c712a1d724
-
Filesize
6KB
MD50eefd5e6521fb0b7743d3e865aa3dee2
SHA1704877e477cb63deb3c79ee15a55f852d511d165
SHA256787d9c2931381aeb81cf79028bc5ad116119e713e94bd88b92a7f8b32a684822
SHA51255c041e06b74c3815f5a885769ead743b122663329b7f6fc549c6afca5c8ac57ece86fee715535cfbae9a6808a4d290b9678ef31da4010ea139825cb85dbdf8f
-
Filesize
6KB
MD57940dac54446aa711c2c53b6c551e5b9
SHA1f7bc9c8b3358bf400af362d5036142b9ae17d4de
SHA256d8d09d97fa4bb04535a448f7dbb7d90c7f74ee24bb8e1d46ff1e4f1d0b0135cd
SHA512c95f6d769ec8060eee3298414294f683e178284cefaf76869205d49d84ed41070c2f674aeec504f8f67c6cdbbd23b0c8552e33bb651a8cad9d7e757a62168a47
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f676696ab47620b841b67ddad88d9c9d
SHA1e899c0df75b211cdcad1a7c288fbd62e8df94123
SHA256583600b67ca912ca9536d19392cdb72c6306803891ba38125f8bf133a3ea0106
SHA51279aa4e7332c7b035120f30ed7863acf0a76eb90b2b3981bd0166c1a15e81dcca2f8e55901494e10467b3f86a1b417b454842c83ef6751116b20137fda59e8769