Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
-
Size
1KB
-
MD5
0ee1f9a9ff46cd5473f18f9a57be2da2
-
SHA1
55c22c3c22d3d3653f5eb294fa6f2dc86f5a20c5
-
SHA256
123e09198c336f2528fe27da42da203edcc8b27311333096a9b86b8792ec1ff9
-
SHA512
2ce353946d8335dec6ed601537a24648358ae9c972f48bd0a1c52687bb572c4cb230627719864c7d8828ec36cf45f7b63251072a0fff764c81575b0de4669278
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1464 msedge.exe 1464 msedge.exe 4832 identity_helper.exe 4832 identity_helper.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4608 1464 msedge.exe 84 PID 1464 wrote to memory of 4608 1464 msedge.exe 84 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1528 1464 msedge.exe 85 PID 1464 wrote to memory of 1444 1464 msedge.exe 86 PID 1464 wrote to memory of 1444 1464 msedge.exe 86 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87 PID 1464 wrote to memory of 540 1464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca3f546f8,0x7ffca3f54708,0x7ffca3f547182⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7888956824345829706,990346196868919872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD58a7dbc6390637a79dec0b75ecef11be5
SHA1d73db3d61d8cd20756d756ab08fa41586f0a3aa9
SHA2560d8ad62d1bcaea594cd3e8433d7d7a8b7ba2a76fd7d0aed90ffebeab1b6b3052
SHA512f1d7f237bcf732f0b73f999c0f4ba0e3f463115a4f9730ef15e799450aaf69e7e92188c97cd1a800609bc94cdb9a9dc87d0d897d5a0a1247dadfc5f701f711f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d5212cab-4d27-4736-988e-5b6ec9307ea2.tmp
Filesize5KB
MD5ccbeb152a92a402bbe78934b48c2b5b2
SHA1f5ec139d7ff3a5957ddb577f9bc813a0d5625226
SHA256dfad5e0648f9de02049ff610bec5a9b7ed9d3d369637bc0d6a5810e9172ad387
SHA5125a3fd5368624e9228d3d915b8d54f09fd92351298e2d44c5e7527311c6e3eaf9e1cef520948ecd0ac9dd2879c8ed59fb25c845a53d936b265b5b308d139ccbd9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD538a1c29e61b17462e1c16c00ec00606b
SHA156effb723b9832e2362e72f5e1ccafe088a506ca
SHA256de2a733229c01d51e5215497f865b576654a50c6978fc5b45d1f1caf778af2b3
SHA51291a91f44bf9a8da7fd2d5de8ed148677f22cffa909986a2c3d8b4fc2c49201ff2b2e27f673d60b640da11ead98df7ecdd1db36c56545ef0eabfd395d47559c9b