Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
fd4f6e88878224b50c0c421df529aca4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd4f6e88878224b50c0c421df529aca4_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fd4f6e88878224b50c0c421df529aca4_JaffaCakes118.html
-
Size
3.5MB
-
MD5
fd4f6e88878224b50c0c421df529aca4
-
SHA1
84b10323b8431c64f2b3ebe6c19a3e635f8a6f1e
-
SHA256
7820eef1aa725a9dbf7741251c97e303aea1438f961e39ffc8e403625e0798a9
-
SHA512
3643c74f928f9eb37910b234d7270e92d340c0296f191c10d0637d48fbf05ea06b8badd29efce09b3398110c2ed8d808d68d97163923bedfb4b348e210780d7a
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNj:jvpjte4tT6Dj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 2052 msedge.exe 2052 msedge.exe 2368 identity_helper.exe 2368 identity_helper.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1076 2052 msedge.exe 85 PID 2052 wrote to memory of 1076 2052 msedge.exe 85 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 468 2052 msedge.exe 86 PID 2052 wrote to memory of 3148 2052 msedge.exe 87 PID 2052 wrote to memory of 3148 2052 msedge.exe 87 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88 PID 2052 wrote to memory of 1920 2052 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd4f6e88878224b50c0c421df529aca4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d1046f8,0x7ffe0d104708,0x7ffe0d1047182⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6432989868359045577,18194442298592996307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5c2d410ed21c3bb1efe544c0fb552784d
SHA1f5a7c0ca9bcfc1ca2e1755783d4fed5e5c9b3d27
SHA256819f515a751a8bd87d5d97c522923773f76a2d9ca946ddbddf78480af933d0db
SHA512aaac211ecd6fca460e2cc8d190841ed015175c21595dc46e39f821906b982d80ad6510198786e51be4190737d92224bf80d70fdefc721ce6c16f1711ebd59f56
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
981B
MD5be96321515d331cda335188c1ed6c177
SHA16d0d37fe9988276f4e08278958bb7bcce1cd5679
SHA2567649448f7eefeea06bd91f12575735fef7562867e7df84ab313c6c91d8283ab6
SHA5127fc213bd96cd10a4cb74aedbce2c4c0a5174a478c805ca035fed40def599f9b19aa22d36ffb21c916fd8e2fcabe2fa4d217d2be74be4dc18fe555cc5b0c3d4e3
-
Filesize
6KB
MD5c8d438a1d86ee11b43ecbcfcdf4cfa18
SHA196b4f1c0bc7393507d0406bc5cad98f934dd87f9
SHA256f23e98491010d40896c9280d96800c3753a2bf48e14686cbe2d9a1ef1bb1d107
SHA5121b5e2e97f8066ef904fa2af34f34ce48b1ba17d93f98c2dcfdb5d3c058ee63c8e64866096e2cbb8e4a3ea136bc772e7cbcabd4d546b44b0212cf178785f382ce
-
Filesize
6KB
MD5fa7288d33e15c2b49e62263dbad0b525
SHA15fef8b1a2270ebd241638638df0a6cf751fd0b5f
SHA256d9a965083955ce73de593d5d9f647a02bccdad7a54a7062f887d1c578a906133
SHA51210fa770cc46b3cdb0cf118d832fff5006bbfe11658dbf979676d231a8c96e08b3935a4da99d0717d2bb977f7fd13f4647caa95dbc1dc3ef85e455cfbfd83b0ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f72e2a4dac9eff3b848fd1b6c47815ba
SHA1c9b0a080fdccbe1d40bb8fa06876df032151bc06
SHA256963a81f85ebaef65897b772c7f90af033709ba254d0871045944348681a42bee
SHA512a610aa9dba9d7deadabb050810a2674fd7f37335c244e33a094a3e03a425bc7f8abe8fbb24cee10fcf603adcbddd9d57fe46bc389d229a1a38e1c5d1473e0884