Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
175c7c8ab0ec99b9d6dedfb282a7f64a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
175c7c8ab0ec99b9d6dedfb282a7f64a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
175c7c8ab0ec99b9d6dedfb282a7f64a_JaffaCakes118.html
-
Size
14KB
-
MD5
175c7c8ab0ec99b9d6dedfb282a7f64a
-
SHA1
6aeecfcef7d6cd9c9d16703c3407369300c18b57
-
SHA256
95c234071f86e65442d6cccd59e7f6eca7dd884d65a9befa1bc154d1f970dce4
-
SHA512
645e8121705099402a8ef53e8e8309e4f652f4b5dd01a3d9ccf0c75ca95b5e3ce982c6776cf7d039179c3a71287410075edca8da5993828bafdeef833c4d6502
-
SSDEEP
192:SI0oUrj9Fa9ZVO1GGvBPJaXHm5U653TeUF3qapd:SI0oiwkk25fiUh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 5004 msedge.exe 5004 msedge.exe 3816 identity_helper.exe 3816 identity_helper.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2756 5004 msedge.exe 82 PID 5004 wrote to memory of 2756 5004 msedge.exe 82 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 464 5004 msedge.exe 83 PID 5004 wrote to memory of 1248 5004 msedge.exe 84 PID 5004 wrote to memory of 1248 5004 msedge.exe 84 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85 PID 5004 wrote to memory of 4016 5004 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\175c7c8ab0ec99b9d6dedfb282a7f64a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe26cb46f8,0x7ffe26cb4708,0x7ffe26cb47182⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1388 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12844975291392129317,4772564538438875220,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5010d67517ffe480d5be2d1ea35316eb5
SHA1c61cbc999924210e946ff03c61d139e230671e0c
SHA256e301b0ee4549d7c09aaf61e3b1884bdc6de93d8dfa1b4b99aeee3999a02c5ba2
SHA512cf30576e34b492393f948d9e19e1bc34b6d88f5db348dfe5ae0d5267a85c6ed5dd902e13e94b96ab3afcbfa0ebeac0f73c2bad8d0fbe8a2b278fcf81ad2ef39c
-
Filesize
6KB
MD514ca6ca71ce2af21cec6bfe6a69426e8
SHA14d17f2147636539f6620504dac48f8fedb4ee326
SHA2564ef2d677c3b8fed93685f0ff0fe076b4c71c48f4873fcee0034a587214e170ff
SHA512f96e1234529ceb9c9d9831619bf7480b31a06563b8793902acad9e40b250feb5672c979f1b31ae30166d05a9a0df1ce2ca03f4791979e06198e256c033f33b8f
-
Filesize
6KB
MD592fd66870046d89b09903d93a12545bf
SHA17aa8653f5ac22fada54e0e8a0d20b3cf98f4bcb7
SHA256f21bac88d9976ebba036a75d0f8594ab5aeaa16e530d64e06c8cdd7f37a49f84
SHA512079ff4b85ae8853beb24bae3bf4e67ae7bf78109691a48bbc378f5fdce1ad955a9090b6f96dd070ad09b4e00134fc68b66f2db0d7e84439c3a9db7e693975bf7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD541f45c6bcc07b21d9db974209a76346b
SHA15d8c7bbd11c9f8e99db48260ad8b2e7737133787
SHA2569afaded7939e40e200935ce8f50afecab1b707cc0ce2f57417257197771646a2
SHA512bc167e370456fc1e33a3ad503bb6a03c415c295dc8f0f0d46645ee294c36600c5092021a34cca3da3a861afc91f3444eaa5f97f39fcc372effcbee2c1af9ad61