Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
-
Size
67KB
-
MD5
00ccd35fe6549783682618e0086a0a3c
-
SHA1
f96a9812cfb6ba7af8e4ebd4ea7422d41138e725
-
SHA256
2351b19f5dfdd8923b7335176aabf1ab4d5978ec379a1d279c38a2e8f5cfad54
-
SHA512
402c133e3971ee4777e5d378892098f37128a0830a694f104456973e8b628865bc7ef9b89cd9ca147b1be1512d628c50e1354e17172b26ef9771f3675010e195
-
SSDEEP
384:vU7JYUMdmBfGOqwJUwPUAmZMR46VRh48z:vU7+3QBfGOqwJUq46h48z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 928 msedge.exe 928 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 4788 928 msedge.exe 82 PID 928 wrote to memory of 4788 928 msedge.exe 82 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 3684 928 msedge.exe 83 PID 928 wrote to memory of 2928 928 msedge.exe 84 PID 928 wrote to memory of 2928 928 msedge.exe 84 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85 PID 928 wrote to memory of 2212 928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bd5946f8,0x7ff9bd594708,0x7ff9bd5947182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17160450398953955162,4543703881663194308,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58e61ca7ac733682289def72d9140150f
SHA17043c4697f39b9fca25db54cb3cde702174ff166
SHA256689a839b117f4cdc2d943cdd48306bfcba88d170fc85e0606e6e2c17c59fe0eb
SHA5125685cf961f484d141bec1778d131cfba23b863c383c6aebfdcf544e386c1a66542c59c6a668cec7e6a66e5571bda79715ead2eafa369b04921d894ea4bd91abb
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5ccf0ac94021ccbc98b39c684328004a8
SHA16a8cb56fd4496eb717516473114cf7b75b1cfa24
SHA2566b1f897e3f576748d3d6c532aaf69816a02600dbb3725bf8100fbb2df45ddbf1
SHA512a3b848d3a6e31d9c41b5a35f70c6cfbd9522d66af15d080ae6b63d4933cad4b551c28bd736aef72ebd2e30d89bba5e65d5fb853de43c9654350a63ba9c5f0ca4
-
Filesize
6KB
MD58a3acc2a25279dd6b13cb59565030bb6
SHA1e48f6142925f188dd68f616824ea93472ce29198
SHA2566e291c74b2731b5655843f78ef27274930ec6b01be5bae3cfbadec31db3c9cd1
SHA51293881764e45708a63d0fb86ad19cfdf0f52211778e3511734262a32207e487f82337554938ae1116f9d961d37f30e141e77f568b50b07a398fdbab569648cbb6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389