Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
-
Size
852B
-
MD5
f2d7eeda473657921397b54df6a9bf64
-
SHA1
63a161541f2a72f70ef3a7312803bca24a5cee40
-
SHA256
ac9461b1d6f047cdb2dc7105bb83ebdbeddbffae67bb4aed599f161236e6945b
-
SHA512
0a79c6486a6c9682a024cb0ef19a1a878117baa7197e6c714de55c7eda2fae08b4fadb7d6c7c0835d79c795b00168214853fcdd6800521fb63cddc85ce8b2417
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 1736 msedge.exe 1736 msedge.exe 3832 identity_helper.exe 3832 identity_helper.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2656 1736 msedge.exe 86 PID 1736 wrote to memory of 2656 1736 msedge.exe 86 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 2360 1736 msedge.exe 87 PID 1736 wrote to memory of 3128 1736 msedge.exe 88 PID 1736 wrote to memory of 3128 1736 msedge.exe 88 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89 PID 1736 wrote to memory of 5004 1736 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff807f846f8,0x7ff807f84708,0x7ff807f847182⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,2707499199982637192,16823257940292531517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
6KB
MD5c11bec3174b12276d6aba5e34f9465ae
SHA1016beb2b24bca8c5f3022b4978ae47786befcee4
SHA256c538aeeaa6bf31298a29b897632725801a5a4e0ff37ebef549ac2a51862f3e73
SHA5123e0e7ac6ec2768ee3a93c6a0dc4cec3985d11fdf0767802cc38c0c60d0c5e59deb46fde1d80bf5bd582ffa75f987aefa96066093fff1637c830f1e2afcf85086
-
Filesize
6KB
MD5c480ad0166194f8201171b92bb065499
SHA100d6e6740d380719e46548047d0755b43b8461f9
SHA256d6639b1d0cfec73a1e4d0c5bc7f6d02c438e0c44f9b6970b25b5afceabb9dfef
SHA512cc3d0477b1805cb0134f8385b22df6e7a56e6bfef7449ebbef2a5c9bb8dbf013d7073b0a22642d8bcf7159ddbf2dd4196dd08b555cebff0bdb4c650cabd16984
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ee53aa9118718fd06d5b5b1d95468868
SHA1aff2820ba84f59d42087234e52906309160f9293
SHA2561eff1d58a5a32e56b46b0a7e51b71ce619fd4914d7fd223327379fd66e2cece1
SHA512b60e2d068e6f339adec06ec7313eecfde6953c1ef300a9ec63bd8c131f252d4d1b81074d39bf65397c5020593c178d0762a63c91d8fed9967689c18d4834434c