Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
ff00cd2a6c959b970ac32688113bb9ee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff00cd2a6c959b970ac32688113bb9ee_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff00cd2a6c959b970ac32688113bb9ee_JaffaCakes118.html
-
Size
2KB
-
MD5
ff00cd2a6c959b970ac32688113bb9ee
-
SHA1
5d4293d92560637f4cfa9fdf944e98d617a2303a
-
SHA256
735cca1370d49ad9b8295b7181aa815e716642eb90fba0f25a189faa3b32935f
-
SHA512
a6c74847c36c5f1720659f7c018ec24361e3ac77efb0169c98bac132f816ea6b7cecd47c38a41bb9de375a63927de31ef84fd462e34364f74ba019b655dc845a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 716 msedge.exe 716 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 872 716 msedge.exe 84 PID 716 wrote to memory of 872 716 msedge.exe 84 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 3220 716 msedge.exe 85 PID 716 wrote to memory of 4960 716 msedge.exe 86 PID 716 wrote to memory of 4960 716 msedge.exe 86 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87 PID 716 wrote to memory of 1500 716 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff00cd2a6c959b970ac32688113bb9ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffada4c46f8,0x7ffada4c4708,0x7ffada4c47182⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3225313925340962990,3543363798629548273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
Filesize
6KB
MD57041d29abe8ae151163c6d2d61d283fb
SHA119a7a4869d7a5ebad31f4be63cc8ee3b82ff376e
SHA25629ba2827510341d4342b480deb51c895d5016f7dc244ba02646848e608a54da2
SHA51227bcc9d664a5003c5b0311709551349103fb04cf5d36a6dc8c1ce6c3c6b99af21fe6e80deaf142ebfa4e48f4d188b3a0eaa21a2d4abd2b408ce159d4ee84683b
-
Filesize
6KB
MD5313707896d7af34ea73724836be37c05
SHA1d5515ea810e69d538b351569ac4458b76cb497a7
SHA256a7a6791d9d221173116e7ab2eb5142ca7c2b00a48c5b743407ca3a9db0dc5830
SHA5126d1114fe179602ae583bd790eda6a68b86b0a941e13a9e28ae155815f95da4c351d4ce2f0f8e7175f88f6d6d6797d4e978c0825d03c3e3e5262ea3960e4dd61b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579f142d864109801707bef72baf8db72
SHA11f74bb132993ede473ef80027f6e962c55e6209d
SHA256058f21d4610b719dfa30c6520492f26296d590f76e33162cd47b6db5f7a05b9a
SHA5120daa20684f516654aac464cc228bcbde37c28bbf39de7ef20a3f6abc23c4c29ee781bbbe8e5c5e4aea34639a7e1cf963a3ae1f87792461c418ab9dec896d9445