Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
140be38dc0152153f5958de6c44007e0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
140be38dc0152153f5958de6c44007e0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
140be38dc0152153f5958de6c44007e0_JaffaCakes118.html
-
Size
55KB
-
MD5
140be38dc0152153f5958de6c44007e0
-
SHA1
f2e8c5cf70f379d84391f0534f9c21f3440e34a4
-
SHA256
8798ad29074e952b5d3f394bab25d768891a22a74adba874d88cf92c617d6ec0
-
SHA512
5a53cd747372a69a3f8b94ff058bb3f9fd2e38403eaef0d6c7d515df6b2d5453a10bbfa934f089f749186dd17a54b2003f3113dcc38ce0e50f79a39dc5d4c4de
-
SSDEEP
768:CtXVVmpepE3tHqWuTR1T0ATNcjUFztwAYEiYrUBK:8VV8dKSUNc4F7Pv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1408 msedge.exe 1408 msedge.exe 1172 identity_helper.exe 1172 identity_helper.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4184 1408 msedge.exe 84 PID 1408 wrote to memory of 4184 1408 msedge.exe 84 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 4232 1408 msedge.exe 85 PID 1408 wrote to memory of 1620 1408 msedge.exe 86 PID 1408 wrote to memory of 1620 1408 msedge.exe 86 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87 PID 1408 wrote to memory of 2132 1408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\140be38dc0152153f5958de6c44007e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae8446f8,0x7fffae844708,0x7fffae8447182⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2396 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7292020213701121585,2198191554235855774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
525B
MD5253629bce2b1b67d27a76ac019b93711
SHA176ce0dfc1d428b328941e69c39cd1d72021ce6a4
SHA256481feb9a50916891d4102adbed75c770df4a0d5ccf5cbbe9c7f3be09c920c2fe
SHA5120c0827e7159801f9af3931c14d6bd62d06093598c465582d9df11b86f7f760624d2f5ef62661cb55e03322d990b1340ed204679ea82d3a891454f612d18a5466
-
Filesize
5KB
MD54b2ac4c3ff0ca5684048e000bc688176
SHA1cbe710e4015a5a147542d7994d89e3e7ac581e15
SHA25607b15992d55cd246dfa4abcee4fdfba19e461aebfc24c835595504eeebbe2ec5
SHA512f0155f11f16787693dea98f14db25083273e44aba83dbf7fa1aec19695584e9f8e406f245368edb7f1e9da943793db7551d1d62b73f566bc0131e8f6123125b4
-
Filesize
6KB
MD5c6a5f531b3ca67999f94cbcacc083389
SHA1f5e3257d45afbbd620aab560e25ac3c42bd83492
SHA25696f8c1beaa8fe8a65f0edc8d35827cef5ce86c0e7d7abac11d07ffdb3ef341e5
SHA5122b789f3a5654c5e42e592e27df851d9d09d467e1c544a579012deb2755885d17bdeea0969a1bda3707198038bb2bd37dbcaa672465cf5dcd750581feaff6ebb0
-
Filesize
6KB
MD54c8b6e1141a938303717d84b8a76a9ff
SHA19c976d38a6d50b564a900e28cb37a3b2fc7c469c
SHA2569fb77de2707071ddd48d21dc9a7152d7cf4e554540262db38e19581b18a99527
SHA5123278aab56a0eb8b06be488e33fcd758482ea2d52b6d361cc927b0f2039346739186fdd5efaf3ef0f9a2786bf00f37ce953e47c6faa3c15be93c0e45b226e8551
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cf47ddcb2ffb7a7d8ac62d1be86d101e
SHA14332c3380a52e73b6069d64300db945d284e7d12
SHA2564cd83457c53535c50b8ec4e635a22bcd7debfacef8cdf7c697f943879010c264
SHA5128365b0f9848318c67f93efde3322c4e2dfa0fdb6e9549733d73b68346255a318f646c9dc29ee715ce43396c7b6475f35c920871f78698b113b25dfe5712bbf4e