Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
08cb6ba8dec9560b6397499225fd4f71_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
08cb6ba8dec9560b6397499225fd4f71_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08cb6ba8dec9560b6397499225fd4f71_JaffaCakes118.html
-
Size
33KB
-
MD5
08cb6ba8dec9560b6397499225fd4f71
-
SHA1
188099e48ef8393806e92bed6cbec0a1c7d6c728
-
SHA256
754cd477e57764a2c6d473d71e097d92ce91f1dc60eaed5964da4175282eb29f
-
SHA512
dec3f5c0e7f5904d1c7d456928d904a30b7e352fe2e52cf13beb17edae81693c24be6c5661b0ab1e07db0d309f8dd6e98493e9f2013820fc1717ed92a02da5ca
-
SSDEEP
384:S8hbI6fxwRifs0/e01Oi4Bks1v1ODhkejRRLs5xdRdFkKt8cjkcURSGyZAt8ALS1:S3qCifs02a4Brg2kTAlScRbP7gDAv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1936 msedge.exe 1936 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 208 1936 msedge.exe 86 PID 1936 wrote to memory of 208 1936 msedge.exe 86 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 940 1936 msedge.exe 87 PID 1936 wrote to memory of 1276 1936 msedge.exe 88 PID 1936 wrote to memory of 1276 1936 msedge.exe 88 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89 PID 1936 wrote to memory of 2264 1936 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08cb6ba8dec9560b6397499225fd4f71_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe424c46f8,0x7ffe424c4708,0x7ffe424c47182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13177997217077290975,6647989579598034958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD55e8bedc83dc8ef8daf6dbfc62b30942a
SHA1a0dd68f6116b44e90e309f32006011b52da36cfb
SHA256098d68a313d68c1f91a0a7b138c65126c9e9d228bed060fb4d2c7ec2283bb283
SHA5122859c59cd6afdc2806732b85d694fe02cf46774c3785b3e0c5916a7dfb8ff2cdd2f309af5763fd16e39e481b9503c392aed7e3b9b9a31eb558c5c73869ba388e
-
Filesize
6KB
MD51d82e9a78a52d981aaf850d042c3f19b
SHA1321cb609b7d6bc6c2047b90260541e34dd265e77
SHA2564cd0aa60131d3cbdb19237adc6f37c019ace65df5355adf9657db58e77854d6d
SHA512b21a2dad6741429453fba6d9eb8b22c0724f5147a6b5facfe23a27240ccf2bcab281e6526528bd4d2dc735ef210b71d223e3a69ad5a4c767255479925090e3ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56171a2ce1bbcc0e990214a186de604cc
SHA1912b9379424bdfeb284d1ba5d50cd85b12986c83
SHA256634a6c169430140ac0e858357679cbf699291d93fa074960d093c5e3c8380e66
SHA5124fd48f7c9a528b5604a3c4581fa067a58703bb263fee79e9909601c9c19ac02efe58d4883eaffa4da4a47c4aca98aac657990fdb4b709da9b07cf238c60ab845