Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
052a0fdaf41342068ae951462ffeffe6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
052a0fdaf41342068ae951462ffeffe6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
052a0fdaf41342068ae951462ffeffe6_JaffaCakes118.html
-
Size
214KB
-
MD5
052a0fdaf41342068ae951462ffeffe6
-
SHA1
db716888a540efde4107c9c5fa395ff3794f22f8
-
SHA256
7d495ea325a2c266d4d682e692f62cf159b469d6d0add195941b3047ff528e6e
-
SHA512
50a4c4be0de23c06fa14dfb8f837edf1ca3efb523e11c36bd6bfb57cc147beed63e9e246f944216aa7df4c382295810724d2f92cad55276a9d9d59f5c0ac39c3
-
SSDEEP
3072:/rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJG:Tz9VxLY7iAVLTBQJlG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 4872 msedge.exe 4872 msedge.exe 2008 identity_helper.exe 2008 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4164 4872 msedge.exe 83 PID 4872 wrote to memory of 4164 4872 msedge.exe 83 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 2564 4872 msedge.exe 84 PID 4872 wrote to memory of 1180 4872 msedge.exe 85 PID 4872 wrote to memory of 1180 4872 msedge.exe 85 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86 PID 4872 wrote to memory of 1700 4872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\052a0fdaf41342068ae951462ffeffe6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc28246f8,0x7ffbc2824708,0x7ffbc28247182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4194395999130939260,10510279056674408499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5b106e9f68a4ed307f6000dd9f723a5f2
SHA1917416f17f7509a306c8108fc89f348a6166f3d8
SHA256def368a5ff48242b6519259386fe237032f70d821b75671df30e30dd83c37213
SHA51206e3b241888e69a3f2c7ce0d45182b61430b09d07c81fef81e3a2cbadda6b169b6b9e5b3f72ed4078e68e5fa19ca46d3f8cb7633bf965cb7ccd68e4527a9dbd1
-
Filesize
6KB
MD5c3d23d8706c48288c37d4660d899b8c6
SHA1cb1b211ca5cc435b15bed328b955d7872a72761c
SHA256cff3ca1a14c484e5cc07df219e2dcccfbdddfd54a5ceedd76cc4580ee554a67d
SHA512a0d1d1d6e7a5b05fdfa049822a1c6d50780c638d8dae01edf28b9a8104b8524ea640829d82a2f40eb9eaa24ee0dad78143411f7838041764347c44944c710baf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5d2f0c68d9c72ffd64fb4e51a9812c977
SHA19a89515005799a710a1c67b7872e6ad49bd88581
SHA256120811cc0a36286bd0eada01fd47967675c47b0a41039207eaf9d30c4f630a87
SHA51274ea2e29b69736f58ec70c6949ee0be519dbd2cc692f9292f5dcd162c27614ae628d4c26afe627bc0093c3cda1af1bd7c634b2c2ccb339c06410a5cad930ad5d