Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
0700272658bb8ba114455556ae9b8bb7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0700272658bb8ba114455556ae9b8bb7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0700272658bb8ba114455556ae9b8bb7_JaffaCakes118.html
-
Size
23KB
-
MD5
0700272658bb8ba114455556ae9b8bb7
-
SHA1
33395d5e28de745b9ba1b7d3a0882de7cc258f5c
-
SHA256
0ffc4975c8c3c94db0f0e4306f93e0f2d7ec60b010392b7d1e726a98ff4951ad
-
SHA512
6141f30951622d1e032b77c8022bd1f30a5e9118d8a9081af41dd99081f883284121b7fc23b3cf14b8b521e5078e599d8b03db77a86afac53ab046b11e850524
-
SSDEEP
192:uW3Yb5nfenQjxn5Q/unQieNNnnnQOkEntmknQTbnhnQPCnQtZwMBtqnYnQ7tnoYJ:qQ/tXy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 2268 msedge.exe 2268 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1840 2268 msedge.exe 83 PID 2268 wrote to memory of 1840 2268 msedge.exe 83 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 4092 2268 msedge.exe 84 PID 2268 wrote to memory of 3208 2268 msedge.exe 85 PID 2268 wrote to memory of 3208 2268 msedge.exe 85 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86 PID 2268 wrote to memory of 3680 2268 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0700272658bb8ba114455556ae9b8bb7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa601246f8,0x7ffa60124708,0x7ffa601247182⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17775095723902643728,364799923909289988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD5bb8f85712420511b76de412dcad06186
SHA1fa8d254f5ae4f88a42ee29b159b0f0235cfbb584
SHA2565721559b80981587d69eb309be26ba3484016a50db95b6c653f00856a0afa9e5
SHA5128fb5fe54d5935a3b860c9b6d278517e642ac1c5d52754319551e8d625d4e9f014f199eabb9b83a3a673d1f666ab7268cedd3e4d5e7c607122a24cc5b2df8601d
-
Filesize
6KB
MD5b3b11049db63442e60e88dc549542e58
SHA18bf0665a5d4da7f32b504854860ddd7bb76d8027
SHA256936810adb1dd1b0b5a7a945f5264d8a12747d203516d66c8eba41cc23e39fa28
SHA5129938f2428e8986acdfc156bb475a4aea8697c20f64314ba3babff96fe7452667da0461836fbad4c505addfd7a4fa44607ff4b3f6d5046e39155419204e5d9a97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ca98d9925648e6dab2196e884cd2416
SHA1eaba1cfc88dcde41e255f5ee6cbb1faa45cbc6af
SHA256d6cc37b360bc666a686ea74b2da3d7be8e5002edc7c4bf1a1f2dcf39c3fdf2c8
SHA5127b0fbfa8804146ad574b7fe3cd7b053bb6e6b23ee5ca12be7b044a3fc2f553443d4ed8b386eb4472429042de55bf3b340444513cef0b74603808bd8c6b8c5830