Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
0a875acb7f5de875e89996d4ffc5289f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a875acb7f5de875e89996d4ffc5289f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a875acb7f5de875e89996d4ffc5289f_JaffaCakes118.html
-
Size
24KB
-
MD5
0a875acb7f5de875e89996d4ffc5289f
-
SHA1
07b5dae698e31e6b0df6357d1bdd31f9c23e7224
-
SHA256
f1b813ca5ed5d5462a5db069144e2950f801df06248392ab4540e77ca0980a61
-
SHA512
700c78c2a44f1536b66f115b3ca6af6b1e2b0d4e3eb42d0b5a9d4f94beb46e16cf008d4e39d9400ece220396344614a299bebef1ca536572b14c658c44a99408
-
SSDEEP
768:L+E3W1aFMmRiclumQjI7gs43Rs87Lz+LsAXUjXuqEu1w:L+Em1aFMmRiclumQjI23Rs87v+LsAXUY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 384 msedge.exe 384 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 1992 384 msedge.exe 84 PID 384 wrote to memory of 1992 384 msedge.exe 84 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4940 384 msedge.exe 85 PID 384 wrote to memory of 4396 384 msedge.exe 86 PID 384 wrote to memory of 4396 384 msedge.exe 86 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87 PID 384 wrote to memory of 2552 384 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a875acb7f5de875e89996d4ffc5289f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff36cc46f8,0x7fff36cc4708,0x7fff36cc47182⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1005895317742354977,13931751599872781671,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD5f04571729884f7a4e6bcb1778b5d293a
SHA11adb5a40b9ca19cba14e42f92d68863e43082165
SHA2564f8ddb5a15f9d77d68be0fad96fd8ac8dbe469c7c52d36ecad388504002c35e1
SHA512e8cef897ab38c35526a68e9c5996e3e9041f7cbfeeef5fdeca430aacbd4aa8cf6c0e96441bcaa359dd849199c87e2297f50ba744f538bed6afa4a0918609dbb0
-
Filesize
6KB
MD5838c3de96030796acb3d1d844deaca92
SHA1ee43a2cf340e07a8508a2c5e3c106989c04bef3f
SHA25642bcfdf5e853736fcf3bd63e3f79f07be7723552b7207b63c6f5ea565955a9c5
SHA512e440be16bdf551c0e8a5eac810f975d2420082f961f0c10af9e8cd55b1884a4a8834a1d051d11e655e11a4526e5bd4607df22d4b01188d3847583684c80a1776
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e5131b5a80bd1672ef7f09b654edc49d
SHA1661f805cdeeb469cce6dbfd665ca637709b3fa09
SHA2569815497ad3acd7762bda17bc5d8adc50881b7fd3ce70f0324e1eabca334a99de
SHA512d5b1e621d29060d2a487b0da0f5b6849c3eee843ecd20eae6a6c829554b75f2ca3a9d70573ac7fd8ac7b0636ccbe42aaab1ca7ccc610047919107e740367edaa