Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
0cf0fa487729d197930ad6b6cf6c1159_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cf0fa487729d197930ad6b6cf6c1159_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0cf0fa487729d197930ad6b6cf6c1159_JaffaCakes118.html
-
Size
27KB
-
MD5
0cf0fa487729d197930ad6b6cf6c1159
-
SHA1
5dcc4f02e77744414f55a6cdd6ccab91dc3e3964
-
SHA256
0f74945516f83125c441c02acc9a3ef355259ad1ad8281821474c0ef9001a251
-
SHA512
2783c5a57318ef0898dde8c8ccae43926b2ac5ef387eed8e774675bdf5f52f2e88371c82acb926df517a9d880b641d7fae5bae3d5441bf78538c584a9fce4274
-
SSDEEP
192:uwbEb5nIT7mnQjxn5Q/pnQiesNn2ApnQOkEntnLnQTbnxnQ9eSwm60NAqQl7MBMw:bTTQ/AAVno6ANSWpG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 3264 msedge.exe 3264 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3264 wrote to memory of 5020 3264 msedge.exe 83 PID 3264 wrote to memory of 5020 3264 msedge.exe 83 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4784 3264 msedge.exe 84 PID 3264 wrote to memory of 4200 3264 msedge.exe 85 PID 3264 wrote to memory of 4200 3264 msedge.exe 85 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86 PID 3264 wrote to memory of 1540 3264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cf0fa487729d197930ad6b6cf6c1159_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdb7046f8,0x7fffdb704708,0x7fffdb7047182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16551234006461105835,11671982438881154766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5c751b22c0cef1889d63483ea84dd0350
SHA1f887329b90c7da12668862a9eb44a9e747f65bdb
SHA25680f6a17b6db4e53e4fc81513bf03d27af4bd3ea2b42faf8665b98baafd211c83
SHA5126f4c0d9a48af400d217bfb7cdfbbfe9c9b5dc280f2f700e8c2c79ec4080cafda2f83b3cfdb556e836d68da78406394ca3ef2e984178196fc63fdcaf595f6f326
-
Filesize
6KB
MD5f65ca578c72a91a01f313fd00966bb8a
SHA1e94329bb1de7cfd4b97c036bfb6e4a66e646b8da
SHA256393c07c2fde2a94b74b8bc0443aed80e263e53ab0648847d393e9ad80282e443
SHA51255ab1b4bff57732a55930675b272eb611ef1fa77b57988cc7516b973ab519d9396e15e29fe189ba1ad79a7f7d158ec034db28a879469b163b2575ef697ee86e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b1a8e600a2b5a658bb4d4ca413bc23ef
SHA1c97827b9e321fcdfd95e220d66c93ff8ef67c814
SHA256dd01ae4f4ba6c99a8807caaff3b815cc456c65bf2275ca4639cbcdd8afc99e31
SHA5124198c48f7003b1dcaa882d5b6e1d2e1df754c70b16fc0d6928f58ab0416a81d80937bb7db573398a02035b5a0577705d8cee4891db8a7df9316800d8fcd9ed34