Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
16630ef6e5932b956c6fb435814f3b43_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16630ef6e5932b956c6fb435814f3b43_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
16630ef6e5932b956c6fb435814f3b43_JaffaCakes118.html
-
Size
20KB
-
MD5
16630ef6e5932b956c6fb435814f3b43
-
SHA1
81fb3c7548032fc2a25c938fb475d70c41b1d1c1
-
SHA256
913524d9cafaa7b8d0e5aeffdbc0e02fd3b43a0cd79ef6923ad09666af1df5dd
-
SHA512
dd4bf715f4e76d64d4f430426a9efb948565d84dbe797281a7de84cc9b835745e853625b993c5998284e35c38a24ed698c3f2c39b33e20f9fb0619bf7242968f
-
SSDEEP
384:Bby6PMhs/UaLaVqkXCgR+zZvSH6EPOyl5iXet1OV:NPIs/UkzgR+z835iXet1OV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 1336 msedge.exe 1336 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 964 1336 msedge.exe 82 PID 1336 wrote to memory of 964 1336 msedge.exe 82 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 372 1336 msedge.exe 83 PID 1336 wrote to memory of 2432 1336 msedge.exe 84 PID 1336 wrote to memory of 2432 1336 msedge.exe 84 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85 PID 1336 wrote to memory of 3224 1336 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16630ef6e5932b956c6fb435814f3b43_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab30c46f8,0x7ffab30c4708,0x7ffab30c47182⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14379156036654956980,5858072761498427459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
182B
MD55fba847350341dc385c90bbd14b812f4
SHA1986d1713b103f3d565ccb88077a8598c8393a24e
SHA256ecb5860418331ce7b5253419ebab9fb495ab9dba26b7d0751699949555074372
SHA512227478553cd394c0ae057d78160c461119d7418765a14ab55ac18daec588ef8883c09c931adc149f380fead0a6e0e92cb0d6d8c29c27cacd63143b615b23e830
-
Filesize
6KB
MD592d8ac2b60c669d4df7994adaf6356bf
SHA130a895041aab2687eead1f38daa8057012f4acf4
SHA256672a715a0a5aa9290c803d8e9468ad61a09d11b6a2c5912f0c52eaa9752c6779
SHA512601da1bf5d96de943bc44c339b6b81b6e8441f9d55021e8b314c309764dc7192a6457265778443175fb1b19ad7f4f33c099c02474ec09ac3feda9e0180f9c380
-
Filesize
6KB
MD543262847e72ac186bb39020749e362e9
SHA173cdbab0de0e7728dad0a82dde9865a6145922ab
SHA256cf6076dc8d9d08ad075500a8397553283fd85ceac9b4f955aed262d481780ca3
SHA512b1e7b174b7b51bbd2d6af460acadc5e230f546dc5f3e6f6e5ebde0db8a9496013dbcc96250d2e77ef3a15e6a5aca8701c886ccf433dfd6bd0563bac3131e5858
-
Filesize
6KB
MD573ae59debb21bd07166b8b767b16a764
SHA17176276410a3ee2a7df35a60ddcc26915bba0b3b
SHA256d47793b80dd9ec00c9465c23925fd065be799167eb4c687333f9f1fd5200dd3e
SHA51282d6d1622441f17054a6e7ba36f0cbf0f1c11eb7b0d58cc002a381e1abc61fe5784d14d3e07f4a2eb94772574f5b6f7c802885bad97bfac71f85ac9da46f71a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e21b5867947349956871372edb62b2b
SHA1687d7f23060985f8b39b54bb2d369a35d06c3689
SHA2568ab409758a5d8236c94759813622bab315607c8338ec541be9f4080cdcaca6cc
SHA512bf2b71a4a61c4cb97cca986cb4425740405fb7ed6b569d19eaa755add181b9e011999019462edf95cbcc942fc5a6e45cbde9b908a695f729c29bdf42af403203