Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
e8b26203b8688e3a1e8cc2dfceac5b3e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8b26203b8688e3a1e8cc2dfceac5b3e_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e8b26203b8688e3a1e8cc2dfceac5b3e_JaffaCakes118.html
-
Size
2KB
-
MD5
e8b26203b8688e3a1e8cc2dfceac5b3e
-
SHA1
a15cebcd01519d520b4c772129ca59eda8252184
-
SHA256
a6333944938a42683d0071b7aad8b6265b84cc178d73a0b3a22ca81ef430838e
-
SHA512
e811991bf83bc0725bb484a2e331bcd3dda6610b8d5ac258e44af5e3ce9c5e2cc99da0532cab49f0778e78702c00df6399513035d8fd07d7237d8420b6a96eb3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4332 identity_helper.exe 4332 identity_helper.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4748 4360 msedge.exe 85 PID 4360 wrote to memory of 4748 4360 msedge.exe 85 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4076 4360 msedge.exe 86 PID 4360 wrote to memory of 4228 4360 msedge.exe 87 PID 4360 wrote to memory of 4228 4360 msedge.exe 87 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88 PID 4360 wrote to memory of 3572 4360 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e8b26203b8688e3a1e8cc2dfceac5b3e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8939d46f8,0x7ff8939d4708,0x7ff8939d47182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,7205419823824962426,2210153075538866461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
6KB
MD53ad6ec971982844494041b57a8ff2a8a
SHA1f1ae110b5f1ec35436a103388c506064dd53c877
SHA256820cb0bb3afcf37e50562445e3aa601ff740c8f5b2f23cdea6a3da92314ee1fb
SHA5125ce63f410ce068d64b7cec33e33edeac3e0f80c0d58d891cfefdd6b1b25800627474044d75ec96906c06cbdf17a333195557dae55e82310fd3b0cab165024592
-
Filesize
6KB
MD567c820e0d3eafa3fe81161a40e3fae76
SHA19f40521443522595ebc70fccb9ad2970a517898d
SHA25690f85a292f5bcdf0274e17fc2ec82a8c8ca977e7c147bb671c2c05adcaa168a8
SHA512e9efe7f57ee055187af93d0e65ddcd6cbfd789049a687c8255b5c57a086b631967cfbb5752f99758683ff542ea781c16d8229b48078a25a1b92d4ec340223b6a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e2dd50faff802012a9f3ddab38a82608
SHA10ca1dc99c6e3254b4355a331e592ce37927a68ca
SHA256cf75d3bfd9fd9cdb1d1bb123cc7924a40bbc259b1798fc9bbf57a4a771a30d55
SHA5126ea625017c2df0193887ae83a035d95e2c935561085518e68a0f3469ae55816db3b1feee02789ca88142da0246bbbe32f33d37762c5c7de17ee1276ddc0dd0b0