Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
12f4eba0074795368b507f799581f996_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12f4eba0074795368b507f799581f996_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
12f4eba0074795368b507f799581f996_JaffaCakes118.html
-
Size
15KB
-
MD5
12f4eba0074795368b507f799581f996
-
SHA1
c1dbd733fa0f9e65ca7a76ca2290b652921b7eff
-
SHA256
0c5f97293ac531aa85b400d49fdb8d49b129b34bc1e7cc3ab36ef349155eaccb
-
SHA512
0f08c0c7fd46fd7a1b5ea65a658734e75a7dbde77af658c1a762c552cfb24fa727298fdfa67496cd19859cf992eff27aaaf05d1ee7f401c4c89a0bfbc933cf5e
-
SSDEEP
384:Od0lpRTgPKsKJcM/U1VW2f8++/K+NSGgs+:zTgPKsKPw0/VSR9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5792 msedge.exe 5792 msedge.exe 5116 msedge.exe 5116 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3984 5116 msedge.exe 83 PID 5116 wrote to memory of 3984 5116 msedge.exe 83 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5420 5116 msedge.exe 84 PID 5116 wrote to memory of 5792 5116 msedge.exe 85 PID 5116 wrote to memory of 5792 5116 msedge.exe 85 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86 PID 5116 wrote to memory of 5436 5116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12f4eba0074795368b507f799581f996_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d51846f8,0x7ff8d5184708,0x7ff8d51847182⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8403490627624914586,13516674837424367011,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD51cad5dbe878c141cf7433f6491800fec
SHA1d2941144943288015a6170d8200416bc237265d7
SHA25687d307d2f84280ec51dba29f710a80c2aee826d3f1251c2846974bb19feff44c
SHA512d086df5022f30a834e7a0856c9111413b14838ad2c3fcec5314246a505367398f9b3f0946f416f133652031d08a32a53aadb55f4da1c997ec160c073c6300179
-
Filesize
6KB
MD5e58730ea765f1d78fe905cee52ed8a79
SHA1ed9dd3d89147ddc1c3c32cf15e17e6c2fc1fadfb
SHA2567167d7d316ff38c45a165a3bda0c8071ff167f9a02a3035aa894ad7819f3ca27
SHA512b3a9a148daea96eda35a73ada0ec3f370e24cedeaa0bceb84184aa69d60b68696a00d283b23483e7c91c1ef1e79ebfadbbbd811bb77e3fcd0d9d18eb83d6aa21
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c90864c61ec2827e5450d9735ae68ee9
SHA1979528f10b903c5267638d4f3fce023c848eb07c
SHA256373195e95faa1fdb81fb358c9a676e73feaf38804595f16b80e783e75081b80e
SHA5120f4ef90d5672f2f75a3896ae9efad9796ca2b9595f611e966fe4861e9d406d533c21052c349183d8f961069cec44782e9d78a4d09ee3be9154c5f6bf081ca3bd