Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
fffd49c0a70c05a1979db70bc003a616_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fffd49c0a70c05a1979db70bc003a616_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fffd49c0a70c05a1979db70bc003a616_JaffaCakes118.html
-
Size
96KB
-
MD5
fffd49c0a70c05a1979db70bc003a616
-
SHA1
b0796c65e12bed1da3530b0677f66766b8fa724d
-
SHA256
6317fc63173d62ea79f8c8131ab3fb0f44596ce401e1c4ef68af2a014ce464c9
-
SHA512
17f3f58d0d2c2f7454514bd71bb72a695c5cf940fbb0806a54ea6524f0b311508c87f6fa8d3ee264d01eea5162b029144fb429600a78035466cc7ed9ef119723
-
SSDEEP
3072:bPtNiD4DbG82G/EV2MmSq95N+uWkhbp6RCpRvRU/9:bPtNiD4DbG82aEV2MmSq95N+uWkhbp6l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 1704 msedge.exe 1704 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2188 1704 msedge.exe 87 PID 1704 wrote to memory of 2188 1704 msedge.exe 87 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 2308 1704 msedge.exe 88 PID 1704 wrote to memory of 3664 1704 msedge.exe 89 PID 1704 wrote to memory of 3664 1704 msedge.exe 89 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90 PID 1704 wrote to memory of 3044 1704 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fffd49c0a70c05a1979db70bc003a616_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xdc,0x108,0x7fff8fa846f8,0x7fff8fa84708,0x7fff8fa847182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2772 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,529096050808910561,15486674920243624554,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d94406b964753cc5222ab1343f54bb1
SHA1a5e7de0781fa1fabb3cd89564f2e5693cb4dee16
SHA256fd9923a217cd8d2c44a63dbfe52ec262e7c80b1f1e50c6e0f21f8379c90e7762
SHA5121ad2c144e7bbd809f400f8782586d3768fc82bcef39db986f766897c344efec77ab2c0b6d9c5ee2019ef5cf9ad0c46bdd25392cbc9dbf9ea80e800577f0fc598
-
Filesize
152B
MD549dde89f025a1cce8848473379f7c28f
SHA1b405956b33146b2890530e818b6aa74bba3afb88
SHA256d6d125ba686b825bb22ab967a346051780cab1f55fc68a2f3efdf3fb5598f96b
SHA51253050344674d8886db66e25f42d97bf46b26229972631f857286c2a303897cda58d85ee8ca768bbfb1fc07e52567315ea85d57e39b5b382916700ec389946506
-
Filesize
1KB
MD5b5c2cc3415d6672bb6d5553726290add
SHA1c93add80681daa689a7e7db20b3e6a3c667af186
SHA2564febc8088d23d32ee3ba63edcf04a244537c0d38c64a7414beca1198043dedf3
SHA512517daba5f32757f0f609aeb54115c32b0fc84aa032bc5646c7ca192e77cd1232f45f57e160e9a600402b1eb96c4caff047691da94b2c5a46ee3a17e1a77f1088
-
Filesize
5KB
MD58991a372c5c1debd9bc673fb7e5153b3
SHA12cec5caa447f600e05c7af62fc4cafafcb4ee4d2
SHA256a51114349e3df79573f00d6224d7fe4139e33abeeb42e4a64ecd95883473397b
SHA51208ae5dbb1facf74dc1bf41e1ba4fba59e0d5ddf04e6a3789cc91cbfd2d01bb0c22bad714c13bf9795430e4db5ad99ad349151b548251949de4ac80a23bfe7e53
-
Filesize
5KB
MD509fd40e9981652a4c2c8332dfbb705c3
SHA18b04e333b0b6f464c66076cf1d249e1780ab8121
SHA256ca37a46b0f8f3699ec0b9d5530320566ee8715269827b37c35d7161fa581cd34
SHA5122a3debd9914301a2944827e62c1d7483511ee5229f06e83818dd3bbcba156764cfa88a3d7a0e9f6fd8245df9b85545bb9b3d9fac9a3ed132c4d15791376a43ae
-
Filesize
24KB
MD57c43199d1e5acf5a31e1cbef990fbc47
SHA1df7bd524b9b3175325c0aff3469ea7f2211d3061
SHA25652a6fd2a2fff53c738c77a6385e7e1677f8990781699f78c63d5a4b0fe566d22
SHA512aae886642b40ffb0676534fd85abe43ab588526b8e952b12a1bcafc73cb05103c76aee4fa32cc18c74af6c59aa1dc84bcda09ebccb7d11adc79fee3bfc93e2d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD544f05386de35e1b3067d6244858060e0
SHA113156fb9a71839183927babc6e323de3bf5df14a
SHA2567654bc919ac9eb7e523487eb65beea42f56bc817ccea629c7952f0ac50d42783
SHA512f99c040722ebf31b2a13a40930ffa5854fa4876770fd9e949e994ef6c7c4b3342ac8e43ee6ace79b5f4aff44841dd6cabab86ef7c351d589eed96339c0215949