Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
03b3b4fb9837a3637e8388b3dd7131dc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
03b3b4fb9837a3637e8388b3dd7131dc_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03b3b4fb9837a3637e8388b3dd7131dc_JaffaCakes118.html
-
Size
19KB
-
MD5
03b3b4fb9837a3637e8388b3dd7131dc
-
SHA1
285bdb0e060dd0cdb20c8b7c66d4f178a36f5376
-
SHA256
a5a72f9a04e42a3961d663c189a29e74f7df14d1fad767815afb05ef39dfd00f
-
SHA512
5b513324f61ff78b8244459305bd7110937661d6aa7bc188ee5390d9a5e03eb09badeddbfd083311b72836996b0bac82bdc071082921e62e6665dbaf65ca40e5
-
SSDEEP
384:zikKhgESZVBD8c+Q3RB0YrZdWnemLxXucfIk9xheB8zVc9+d:zitSZgcR3H/Zd7mQOIk9eB6q+d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 220 msedge.exe 220 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 2516 220 msedge.exe 83 PID 220 wrote to memory of 2516 220 msedge.exe 83 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3824 220 msedge.exe 84 PID 220 wrote to memory of 3924 220 msedge.exe 85 PID 220 wrote to memory of 3924 220 msedge.exe 85 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86 PID 220 wrote to memory of 4344 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\03b3b4fb9837a3637e8388b3dd7131dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72a446f8,0x7ffe72a44708,0x7ffe72a447182⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2708007583285749560,14330955911003463872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD582f9111e527a446e3dbc506514bf6a5b
SHA16acaa7860c0df691263133a8f6a6e76203e0651e
SHA2562b6c6fdb7ab22ab6a9d9fa85a5c73cbab4a86e89dac2bd19a2f9f17d65638c49
SHA5122ec892f2e8afacd302e7dbefa528fae9dcedb746da44a71e15c96a1e1063c3874bd186a50ae99214aeb5ec2dcd1ca96500fc1b2eb862ab6bbbb77d818056c92e
-
Filesize
6KB
MD5b99c1b69bac4b060352626b607aae0b7
SHA103c4a15ea21e02260b8362ca60f7211564700796
SHA2561ce246e31f1af42c33072d013804f1e24f63b975497e063eb9612ad93836ab76
SHA5123715bb319fc07fd56dec3cd79ffcd6e123a5fc01311dcf7f8345317b3f5d75ffa841d4ec280a315618209edb7e5fab519322487b0ed699514b56f89669864441
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD52b5ae79fed3e2690be953ccba8ef6df5
SHA1f5370e60e1a9db5547e39eec5875af8d208c12f8
SHA256a9ce443de0e40b88d2afacff67b6e73ea8c34b9a88cd522423965f028a874217
SHA512cb05d29e14481bd4a65c9a0e18dfa9dfba346830dc230780b6eccbb1d798201fd8f08191abddd8cbc66029288067a4c4f522bbce02096b7f9ddb585f87ffb068