Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
-
Size
46KB
-
MD5
02e7793d594ae74f42c7f0292915dda9
-
SHA1
f02df18b999bed8d8093371505da12eb78a27414
-
SHA256
f3ca2cd9d90a22a2dbc2bb30306da6c0dc96a1232be5468dc04c2928a13f019c
-
SHA512
65f890bc25aeb73b9f97308e9e5ca3a186c1c97bbb9b14f54a470dae79acd115fd91b5d37436557f6aa6fba4c9c18d6ea0c868b203c1085ef35c7375ba47924f
-
SSDEEP
384:Ur938FWb52rVs1AqyAn04FdSPqPqeqddtImurs9WqSwkuJ+jk2qZkT6YOpfFTeJY:23IWVpRfH2kIXZILym6YQfFTesEI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 2312 msedge.exe 2312 msedge.exe 4380 identity_helper.exe 4380 identity_helper.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2488 2312 msedge.exe 85 PID 2312 wrote to memory of 2488 2312 msedge.exe 85 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 700 2312 msedge.exe 86 PID 2312 wrote to memory of 5104 2312 msedge.exe 87 PID 2312 wrote to memory of 5104 2312 msedge.exe 87 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88 PID 2312 wrote to memory of 3436 2312 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff873f446f8,0x7ff873f44708,0x7ff873f447182⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14472434945647815985,3755926236229592017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5a4c1539185563b917cab3af0c060560b
SHA145e15aac0b6732194136a4616432404402f7c91d
SHA256636c2a94eefb964077fce4f1d35c56c8817b0fe75704ea2c047ba496dd16a26b
SHA512c88e13cf94470b84f4810010051f0ce0e3226d4e542b04b77818995adc82ac9ac4b08c6df68020e44e2ffef75e3212e1c7b3cd4fc3b09f42850039ab2d78d32f
-
Filesize
6KB
MD508f03d7fd9b3508e07c90e24ff56cb5f
SHA152db10203e1e8319fad8b41c7206b534da61a8d2
SHA25692e27c90db283f2260d39f8d76f54d6eb894e13880d819103e38f64eb61b5cb4
SHA512275a78a63874c5d44ad4d559edeff346a868bd01e1a540287ffd7d39ed91b639517f20fd6c647cf34cccfcea4ddf86dfda73da375201d5a2194d32361447b0b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD586dae918b15254dc60a088bb2ff13297
SHA162fb43144fdab72ab8946abb87e6ac9d7f537219
SHA25673f102277481ae96f82f71ba1979d4cc4208806e6cb3fea5f3e86dff2ae0f4d3
SHA512e156d5096e889f14e6f3f774445f231599093e13ac93744131a9d4709c1fea4ee42ac1dbcc87ece935b2b66e6f37cc4844702cba8e9b00d5b2119d1531184e21