Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
831c680fc3c99280fd2ce6fdb74200c3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
831c680fc3c99280fd2ce6fdb74200c3_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
831c680fc3c99280fd2ce6fdb74200c3_JaffaCakes118.html
-
Size
191KB
-
MD5
831c680fc3c99280fd2ce6fdb74200c3
-
SHA1
152be4a34288bddf64549b0ee8d1c170b3d38545
-
SHA256
5370661518f3f62ceba21a471c65d3c9a4203fe046f822d3b1ee2d13d505d8f9
-
SHA512
ca1b17047f9a602a62e30f2146872f439543f5f2bb943140da102c4f06532431cb266310be5c48112ccb877198ee04b48b44bba8138cf3c90f20644409fc6a8e
-
SSDEEP
3072:ESTZUC+yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:HsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 1856 msedge.exe 1856 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1956 1856 msedge.exe 83 PID 1856 wrote to memory of 1956 1856 msedge.exe 83 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 5108 1856 msedge.exe 86 PID 1856 wrote to memory of 2704 1856 msedge.exe 87 PID 1856 wrote to memory of 2704 1856 msedge.exe 87 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88 PID 1856 wrote to memory of 540 1856 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\831c680fc3c99280fd2ce6fdb74200c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd315d46f8,0x7ffd315d4708,0x7ffd315d47182⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6317467320186665533,11551487240090397997,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
Filesize
6KB
MD5b3808e9bcd1754090ed1c649bb09b381
SHA1decd44c5c029c6a6eb0c7ab19afc2db81e9545f7
SHA2568892a014281875a61bae69f476a0f70e87c70305dd220cae1aae50b59db7289b
SHA512f092425e2980378b92d7a2a9c170a330c49a20e022f9a1959b07825616497204c51434cb6fda4f2f099181e6e9684b3188f5d6aed72639438039ed95511ecdf3
-
Filesize
6KB
MD541d0111ac99ce3c4f4984de2872cda7d
SHA11b0e6b688d1ec13f40d606c1f6c37755168da966
SHA256a4b94063800cee8d45e79c0e33f4d5bc66e8f9f4d094e0d55ed8312444e7575f
SHA5127097ef22c87175d3a3a876e6f4357652e4d2b7b707f5d69a28ff0dd17ff6089aae679be5f737dcc9735cada0b7b9299c9a39d7be3ac08ee452348c667b27f23c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD509e077a832c9e3950a37f42063bf710c
SHA1f6cbaf317ae5b96e1c196b3361c8e951290d306d
SHA2560526e4b33ae1249ba17811158c80514f5029f28cb2a4e1753df18110e361f528
SHA512c9aae56cf1a94e4ea224c3ff22c66389a8d8ed04a1f3de9fb0326b64bd20e8b43b3fddf28545a3553db6d9204fd6a95813f144479bfa8406103c0ffed313644d