Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
0cd19c620b3047f3e188affbc8165d8a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0cd19c620b3047f3e188affbc8165d8a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0cd19c620b3047f3e188affbc8165d8a_JaffaCakes118.html
-
Size
36KB
-
MD5
0cd19c620b3047f3e188affbc8165d8a
-
SHA1
c158ceb82ff657fdd0c3b408fa35a924037a57b8
-
SHA256
26536e15d8909f5d11f353f0cc8205fd5aa487c2008c47f620552c4574686775
-
SHA512
dc6b89af86fa42fa4d1310dda1dcd0b895b8bedbeb3344041dc4acc324a63eb75ad427ab3a43ac42a7175a15f1fd09f0d812a56809a80c02c06801eff428d93d
-
SSDEEP
768:zwx/MDTH3P88hARqZPXhE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TRZOd6cLV6OxJyG:Q/fbJxNVIu6ST/08YK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 640 msedge.exe 640 msedge.exe 2944 msedge.exe 2944 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 5100 2944 msedge.exe 85 PID 2944 wrote to memory of 5100 2944 msedge.exe 85 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 440 2944 msedge.exe 86 PID 2944 wrote to memory of 640 2944 msedge.exe 87 PID 2944 wrote to memory of 640 2944 msedge.exe 87 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88 PID 2944 wrote to memory of 3684 2944 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cd19c620b3047f3e188affbc8165d8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff297346f8,0x7fff29734708,0x7fff297347182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8581965821926305721,1095813964373080872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
613B
MD5885fbe0f71a3cc216ee4752c1f10268b
SHA1287dd6cfa6e2b97e191b73065457dde02d4a07ea
SHA25698f196f73e14af7f3a32208337a298980ea8ba0292e725f2c357aa768bb54f77
SHA512d8bfbc326efe4aa2957439b2f75757b43531742ac88ac5f53dc337761a968e1c40126b05a8319ff0031a5c9b446bfee5198176f196d9af1480d0a96acd079a56
-
Filesize
6KB
MD532edae0a1d37278e3c774a0188cee5f7
SHA11ba8900d3cf2d335bba6508179d896c237269a34
SHA256fb90003d68533d3fe4fbe45a55c0657e851d8512dc10b396f4271452d561eb30
SHA512e8fed1a45a60ab94288c77f2f416b32c8694bd62e3bcee12f3b06b17974c2d2ef133205c9269e998f23bed0145586b16a48a0361f4610297c86dcb7d3064abe1
-
Filesize
6KB
MD5122581a416ae4e68eb428d3286369533
SHA1403403ce8319208c456800477282a4476aad0c64
SHA256942f3bf21ccd9e760f30f5f971430bf3f21fd613c0202990933b67ab011a77a4
SHA5123a889fc32f37ecd1b16bafd67e8c14221034fce6be2c3b2c865cc074a42956dec14cb1b22d4b65efb2dc08cdb5ef47950c2865142c6dadea5d8ccec3f9975fee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515978a1cb688b5dfef1b9c8d8dd8a84b
SHA16c9094077556e3cddd050f59a925fb14a0600188
SHA256e78b3dd8ef70a7cd5999a3463205171c29321318b26d7f7f4e1c607fdf2d95f8
SHA5124f8d4325ca3c9ccaaa94cbe8786c64f9a003b8255b4600f6bd704753ea6271e006e0dd52391388ae51cb177986908b0bb07550fa6d66b150f62cbd2330c0fd73