Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
07c2c1a17e08c4fa74521b4394c5ba6d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07c2c1a17e08c4fa74521b4394c5ba6d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07c2c1a17e08c4fa74521b4394c5ba6d_JaffaCakes118.html
-
Size
31KB
-
MD5
07c2c1a17e08c4fa74521b4394c5ba6d
-
SHA1
50d98e65c23210c73266582926e9b71e330f7a73
-
SHA256
e19589578361de1d34c852900c83853ad797ce3fa5c98e6ee25793fe24391910
-
SHA512
139a6221d9abcd424029f0b2a324218d9d58f5d2f91b610382f58c5054792ce42d3dbd391ab1c789cd85bbc722aa56e8cfed1a9319750fc5bb67e9f41c9df5fc
-
SSDEEP
768:abD/YFTz7oz4Caut3kBSzX/Psniq/gnbMWgHo:+Yvozu5SzX/P2ifnbMWgHo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 3592 msedge.exe 3592 msedge.exe 1084 identity_helper.exe 1084 identity_helper.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4568 3592 msedge.exe 81 PID 3592 wrote to memory of 4568 3592 msedge.exe 81 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1740 3592 msedge.exe 82 PID 3592 wrote to memory of 1400 3592 msedge.exe 83 PID 3592 wrote to memory of 1400 3592 msedge.exe 83 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84 PID 3592 wrote to memory of 4964 3592 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07c2c1a17e08c4fa74521b4394c5ba6d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb447946f8,0x7ffb44794708,0x7ffb447947182⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17675778408010815185,10377702575738445792,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
763B
MD52dc444bd587675870f2c614526bed82b
SHA1b88877dae9a98e127f41c62e9a03886f9bdca348
SHA2566a15b2bff4ceae75a9c3e563a564871068700f954e8fd89e3c3d94684b0e3025
SHA51299191acde4514f5d9fedd1b63d84b142cc1acabb4a644edb74adc3e24d8e71b15eb2f1b38322088059b8662c3fc9c4889fd9ef54809b0a818785fbb7513a9c6e
-
Filesize
6KB
MD52fd42abb50224f552acbd06c4b0fedfa
SHA1d03f77cd79aab4affb3782b0085d36db377fa420
SHA2561edeb975c34a236ad158ffd280adc29edcfd10d378e154a84bda03c98bbbf8d3
SHA5124950a2ae89779eafa9c241be9dc18abd66900db17dffa0b0b25ab998c48d99c1555cfd90c9f550e7816912c11a207b46197093baf80005ecba9434b5c9cd3ded
-
Filesize
7KB
MD50dfc7bc74fc8285bffbd4e0c8a763d0a
SHA161fc4b92fa60d0f9c20badffc8bf552ffdd5345e
SHA25699a2e1873323f03c4e4f1a7c5823ee9e2c28e6e9f0f29d71797e86c0f4be1263
SHA5129ada5568695f80206d645c32cf4e9a43779c5b03c4b24d3648e00ff2f827832c8b99af156beaeca0455038a26f72a8660a50bae00ca884b1f1e513815cf3cc1e
-
Filesize
7KB
MD5448076d3d991f3f9eeeed693ae477c19
SHA12d2d8b8c3561a8af5964e7bff8e6c156b14e4d99
SHA256718219d0a396ec8c6a96bfb075b2a83044c00c1a5e657426401fdc612ec6dfe3
SHA5125461dfcdd5bc2717af448fd837809b4b182843314f7f3033f58e85b13192d3f926fa80f5e492266ef10d3aa1fa967697938e3456807b0e76afe21e737b37434c
-
Filesize
540B
MD5505c03de838408d54c9a5587edd04532
SHA132e1d4d47d5a3fc7f021bb114edec9489d6039aa
SHA2564bd6d19e84e93ce70377269fb5d789a6795532199a063fcd810a41c5b927b886
SHA5126708d43a0a35ebb1ec69102b2b55d781b7de465d5b3ca27b2ec0df3307c283f531b8b00cbed25fc83a8c7eb36e52e9392bd19af1fcc917ef99b2251e0bc462d8
-
Filesize
540B
MD500578e7484095cf8f46be5e7c67577fa
SHA16ad0a31e4fc4a9562d8abf8fc9d3a97978c5f55e
SHA25676b9f6f0e4d6ac51b1e3f156267d62b32a77ab66ea61a14056e711dbc500d07f
SHA512fa712ab5535c6db8215183224d106fbeaad2ddd570fdc829f5dbc27066b6909500c9f1a75913ee55b893bd24c36d0e33ef2549b01af529650ef0da5b05d69d71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD574458991cd832d53efefc8772c00a907
SHA1abcbe9116ac97d65d57aa52b35670d86635c2818
SHA256b55160b45d73e654a89eca1ffadc6965b62ffd219a9a965db1ffd4ebeb5c596d
SHA512729dc9cb22084fa639afc3236ff22e54e6c27633a7283a80f4e42d5598b046a62adab7f49e2afb1dc8d46f2fbf959683ab37f2f1417fa454cfd5ca18aa397581