Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
15d3d04c92969645c3df25a7c4f08975_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15d3d04c92969645c3df25a7c4f08975_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15d3d04c92969645c3df25a7c4f08975_JaffaCakes118.html
-
Size
90KB
-
MD5
15d3d04c92969645c3df25a7c4f08975
-
SHA1
bd03b773c496acc4573c67baade8c083527ec553
-
SHA256
6085a67c115ad9c67311acd260146dc8a32ce03bea2715dfa4bd31155117f04b
-
SHA512
53a7a8e3758a9c2506fcd72fe9010b5717bf0b96cf68024242d0a2069485b74f45b2d4b787ccaf4313c2f6b7ebacda5474c8245cf93552a49191407c80e945f7
-
SSDEEP
1536:3GFbxFIatl073Eh9D5WJhh5wJHCTIwywdwzVVz32xOwzwsp7U9L:Cbtne3Eh9DsJPy5V53g7U9L
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 2748 msedge.exe 2748 msedge.exe 6076 identity_helper.exe 6076 identity_helper.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 1596 2748 msedge.exe 84 PID 2748 wrote to memory of 1596 2748 msedge.exe 84 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 1384 2748 msedge.exe 85 PID 2748 wrote to memory of 5116 2748 msedge.exe 86 PID 2748 wrote to memory of 5116 2748 msedge.exe 86 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87 PID 2748 wrote to memory of 4480 2748 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15d3d04c92969645c3df25a7c4f08975_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc6a346f8,0x7ffdc6a34708,0x7ffdc6a347182⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2568 /prefetch:12⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7304 /prefetch:82⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6764 /prefetch:12⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8008 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4231703282724148762,8169622804706795803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\67c4397e-3796-4dff-a1ff-71e921bb250b.tmp
Filesize204B
MD5093fbdd88644ac38559e2cfff9bbc782
SHA1d8fc7e9064bd812ea00e5a1e28c13314b50a04e6
SHA2563dd1987b443d514a372b5d65410e20877a6e5516b0a83234e0fc67047c804cc0
SHA5121b85634f4b0279d7931f32b2d194473d7f0ce175d1f790c00b4bfa6a489cc8d32f9afe819d685a5246dbe2642801007d94e16ce680dc520fd0920be3a81f4a2a
-
Filesize
535B
MD549eecaa19252bf17ad4c3a77bf96a407
SHA17ca883a345f1b3951fc7505ed6d0dbc518f2d43a
SHA2566669d78000674a625527c9818b35f779695dd8d85ed698625837daaa600ba7cb
SHA512cee21a50fd405101610f8d27b4b9310b8e049183ab8f37e3d1b1b905dd2e6c371e3ff3870ce579fab69746598af77a0c2a3b3250ee7b88272a5460785d9fcf76
-
Filesize
6KB
MD5af4b06758649128387918e0fcf034523
SHA1177eee7c779fc956c2fa1ab3d24c143eb1a4748e
SHA256528e956aba8407d45cd964634339332bff9f4032a6654f73bd922cf0d4b0e545
SHA51204a3135a162f8663fcca4cfe3d6af758f5d4a5f79b8807965f40e9ba3342bf4fa9ca3758f046821ae70c7bfec2c199e3ad6b9be9b580fb44a71f1394bf1ac884
-
Filesize
5KB
MD5dd33ca0db1f846d2c506dcae1c72eea4
SHA187fa75d642b0749d62aaf44c4e82f2471e914659
SHA256e6e902ff28fb8521414f4418efd778b6230a87978ddfd3aea458222a5d2f0543
SHA51227cb0bf77b020f9b67205d38f99fff953ec6ea54c8ef10b1d15bc60ec5155a406f0e6fc34db367e7e52c509bded2b7e2eeefd556a5d7ac38d1a5fee0b2b0e652
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD504f60e5a91750c4e8a14136c2867cc9f
SHA1562a4be4fbbf8310c2609ec844785cc89b64cc00
SHA256f55fe32d36aaaac9e4f1f13d5ba8288c3510a37e78b33ae4673f39493fd6e890
SHA512a0f7f79437ff93234e94838ce768c3382a3c25be20065e98776e74e757be3cfdab6696ab8bd04c080c15b7be25a08e1eff7b114ed92e6ffebc55d8c8de776311