Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
0fc9896ef9bde27e47a4322a0644405f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fc9896ef9bde27e47a4322a0644405f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0fc9896ef9bde27e47a4322a0644405f_JaffaCakes118.html
-
Size
125KB
-
MD5
0fc9896ef9bde27e47a4322a0644405f
-
SHA1
f4c87e42d0e08adc8ceb7660b770333222d21ed3
-
SHA256
742b9ec6d3e605edc4d71de1f2ecf6973d3583d83c95399c04ab67574962f3fc
-
SHA512
cd516acda8511922e7ad23c130c6e276eefbcd28ca1e94bc60380edac17e11e7260f30c9f8a13eef97f59bee8d4c61357e823ffb1e555c5709d1c5bd2277e45b
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dl:Sv+yfkMY+BES09JXAnyrZalI+YV+0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 388 msedge.exe 388 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 4008 388 msedge.exe 84 PID 388 wrote to memory of 4008 388 msedge.exe 84 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2728 388 msedge.exe 86 PID 388 wrote to memory of 2672 388 msedge.exe 87 PID 388 wrote to memory of 2672 388 msedge.exe 87 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88 PID 388 wrote to memory of 3260 388 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fc9896ef9bde27e47a4322a0644405f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6d7e46f8,0x7ffd6d7e4708,0x7ffd6d7e47182⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14445669378748079870,8605949780088013490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a190b40d16e2961ecbe6022ed1fb2189
SHA1845ed45624b4152910e545161682d0aeeb303f2e
SHA2568027364f7fa2d54acacc363f3ebfb262e16a58afb2be436c0b8957b441f8549c
SHA512bcd9e5fa119274cf31fe4fd72e2b4e76e26f02fc52c05cbc86008c7efbab2b060c840eb33ca13328f3d96512764ae4f430aefc449f9f623f3cc4bbfc80c6054e
-
Filesize
6KB
MD51206815f8ce83c0c24028c9e420c4f9e
SHA184e4b62596394b2a16659a4a37ce9ed5001a3898
SHA256330d2fd982b52b08a7002c4ba8f9f0c5dba90fdda10543947223b3928ce26f54
SHA512a9ff030d9bf4d431df97440157a0e04a3c7736c8560999f460076ede6488e73c74f42b5bc5318bc3f84a5b439d4b72866b2cb1ccf3d0628619a42fb8c147e7af
-
Filesize
6KB
MD5cb69f902d0b2249ade8851a3e8959de8
SHA11c3f323cb97ab068ca4d6db7ef5f0e2c25b05cc9
SHA2564779983094b9d7af5a828e17cc03254858a0f4d090a53bd27c568f1601b85315
SHA51249bb4e1e0417600d5f69f7534dac09593e46a1e31b150bd3cbaee305600b86b04c3579187a0e80b9ff94ef09fbc8dd0727f7437ff568690a04cebab5ce746211
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aa870b8c5ede6560cd2a7833893d535f
SHA1042aa708c1372b29d30c84d7a350e644f778ef18
SHA256d6a0b423348d700da484ea966e86c8aca1e5cef0c0178136c7accd71bc3d1ecc
SHA512c6f87d6979d09d5b55af3e9f13663f43ef33d1a78e5f8f288ba49ce4600a3e997f4818b5780e32c0cc5b7583c30a69eac1004e44359bd4e91006b2afeebbbb55