Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
04f72b4d437bc932e7754dbc385bada9_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04f72b4d437bc932e7754dbc385bada9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04f72b4d437bc932e7754dbc385bada9_JaffaCakes118.html
-
Size
175KB
-
MD5
04f72b4d437bc932e7754dbc385bada9
-
SHA1
6e4ceef4b3ba4f2f09955a060ad8743531342e4e
-
SHA256
af6aa3e38b181e492861241811c65272c21e8e440d4fb89b3f204aabbec21f9a
-
SHA512
17b4c69d20da50f029d8a5dd11aed3e75747f4f1d65aa927e9501c4ae4b2bf0978c64a65e8aecc6fc9a2ee245656c2172038e2c3a3863f0f4443e9e15bd22d07
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3xGNkFHYfBCJisB+aeTH+WK/Lf1/hmnVSV:SOoT3x/FWBCJidm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2192 msedge.exe 2192 msedge.exe 4092 msedge.exe 4092 msedge.exe 3900 identity_helper.exe 3900 identity_helper.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 2848 4092 msedge.exe 83 PID 4092 wrote to memory of 2848 4092 msedge.exe 83 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 4628 4092 msedge.exe 84 PID 4092 wrote to memory of 2192 4092 msedge.exe 85 PID 4092 wrote to memory of 2192 4092 msedge.exe 85 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86 PID 4092 wrote to memory of 1028 4092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04f72b4d437bc932e7754dbc385bada9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2df146f8,0x7ffa2df14708,0x7ffa2df147182⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,389395205058777032,9082236351838302692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5203bf60728533b8456d0bab7e44df5d9
SHA11a148a14407513b590262fdfc8aab3716e759229
SHA256b22c435ff37eff487dbe1de07ab3972dc16be38ca1810b84dd6cb63e9fd53074
SHA51274818a96a475c49363e320b28f695c0a33223958ad066adfa6b2eff9f541bbb2d85d583be1b5ddbbb375287f6de0fa6b65af04590d4f8efc0ade6c1b12c03d56
-
Filesize
6KB
MD5b9d4b1e971ab10f0853232c3d30770b4
SHA1d57e83dcd7455732da95c4c8c8b3925c4bbf79f2
SHA25696759411f881866e5c2069582a249017dfbcb88aa6ce2bd3fab0f29878934293
SHA512b7f25b191b4dc786e0ac42a283e13f4620b2bf9988919d3a54de129f9af518a7fbbb5a3be0995b0331e3466da3c214442a40260aadd029467131bef1ffcb3c09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5761322fcca58632eafdeefff260bde29
SHA1b8079a77cd022de4052571dbe9e06630b1e7c5f3
SHA2564718181e4136d3e851859d4702c368b96afbcb9738dcda335e3f02eb5aab8499
SHA5120557a3cad9dc6bbaf313d1124ab1c00f29ca2f84afde086509057e31e4bf9850ba8c433964ea1954c8574d69bd4825388c101157def594eac93cbca6b04f5f71