Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
f9ce7c0e6fd7b83ff979cf4e9fc8c773_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9ce7c0e6fd7b83ff979cf4e9fc8c773_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f9ce7c0e6fd7b83ff979cf4e9fc8c773_JaffaCakes118.html
-
Size
1KB
-
MD5
f9ce7c0e6fd7b83ff979cf4e9fc8c773
-
SHA1
c07b3e0b44eddf779315d41625b24d7cb2958dc6
-
SHA256
629ad9db978584868894902842aee0e36f38827719043cb54cbb1367eb4ab76d
-
SHA512
a09b90f20a82ba1a306e67192b922c1c11f913f1d2c1700959bfd0541a3f22e384d4e87b2b95ca3f7982cd68e35f3e03edb119f9e6d92a58a2e5d70af08da1cb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 228 msedge.exe 228 msedge.exe 2692 identity_helper.exe 2692 identity_helper.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3844 228 msedge.exe 80 PID 228 wrote to memory of 3844 228 msedge.exe 80 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 1132 228 msedge.exe 82 PID 228 wrote to memory of 4728 228 msedge.exe 83 PID 228 wrote to memory of 4728 228 msedge.exe 83 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84 PID 228 wrote to memory of 2392 228 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9ce7c0e6fd7b83ff979cf4e9fc8c773_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88b8b46f8,0x7ff88b8b4708,0x7ff88b8b47182⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17396717309517717618,3479754183353154915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7068dbc5d66be9ce2817196103217ab
SHA1ecc24ad138e575547b358803789f6ee31a66260a
SHA256b89d90e5fc2e8b7e9057196ca5caa49e1974ca4c58b95d779f95393bea6373c5
SHA5125f429904ac12a13d3889874b1f2cc9c05ec5f15a40f844e74a91e8294e6af344c5f1b1fa72487a5e4759a703f8e5be0f8906f7310f9d3553875a08024c627960
-
Filesize
152B
MD5c4e86f72f6f2bdd2f68d77a7f5477091
SHA1e489acc011f1c8edca2308577653e19e0daf2974
SHA2562abddff8823bde0650a10297709c4ea22258a3e5c79620805f6da52664eb762c
SHA512ca6093a136006f6808ce12a1b3e92dd8f53d6500ed253ecfafa8aa5a97e375641df25b0f3360acf6e063e9ee8bdb814c469973fae663a217cc0932c9122a746b
-
Filesize
5KB
MD5422bb1014af6a73f5c6a072f53af5252
SHA19b947ad016951f84e3029d5ee13a58a9250714fe
SHA256b4af7269b042680eb7439482f45befcbbcf9f04fb997b5839d540bcddc08bb00
SHA5122868351a7faf525cb1701dbaaf050920bdb37317e01805a95f81c39bd818e378b41afa568b2b9d3d14b095dbf38fc63139fa236c3c2eafb50f7e26c6e5f33005
-
Filesize
5KB
MD5bd09f74738d6af8061b40d8e7a0b5dc2
SHA14e7c9c965309d0c6255d693b975fb5d23252eb21
SHA256c1d316924da139d0f338d5ee2ac10a5093855823ebd3759bbc274c910b9a0327
SHA512cfd98adc848f1fdc0d5c8bb81a6f9bb88b5476c7e2fbd4c29a953c8ccf2ce33d81c2dbf0b7abf822388f6b756c818b58768708972b52b77afaea7a51ab793c67
-
Filesize
24KB
MD59e699fa6cf4922d4d223dc5d994fe9ef
SHA14c201219f45689ec69e236a99e2b8783222c6d25
SHA256ccdffba38d1a7abbf06e286f7a360718f52a4b6c8f4f7d87394a86d44f862ed0
SHA51294a8e29d6f5f5d780b567fb23f0973bef99ecc173249a79b90965fe3ddb2abce4dc48d3ca3ee3270e4f58416eaefb4ae1fb99ea59a266853fbd2e1efe8cc83d2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52440f1217a2b5f7fdff7c1fc59b1fce5
SHA1493972d2268333bc90e5189a4c7f518cae33eed4
SHA256927decdfb227a2c8d9cc9c50fbe94d5231f0987711d1d04d87157f6aef5dd344
SHA512028bb057abf3a266953f3846126e4cbf0b9fd482a589bc3f48121aa3b4f1ee5682b77c5ea1cea3f79d243eed345911087916eddc1224aac8b57725bcef674f27