Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
1ebb3b8a78cea6db1e3a109a4823a7b5_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ebb3b8a78cea6db1e3a109a4823a7b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
1ebb3b8a78cea6db1e3a109a4823a7b5_JaffaCakes118.html
-
Size
3KB
-
MD5
1ebb3b8a78cea6db1e3a109a4823a7b5
-
SHA1
ed42bc0a965b21f7ae544de1c72059efc9ebd6c6
-
SHA256
c143c88dd81349427f0c1355044affb906b6f827c20610773165f31e4612a90f
-
SHA512
58949a3d2428a2d7c3e5546e6612676d300147c177a383c8817c818e63a74d0bfbd0648417dcd412b27092a2c6d1cada9db1fbd64b05f4811c6ed7f81dfdf0fe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5276 msedge.exe 5276 msedge.exe 2216 msedge.exe 2216 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2856 2216 msedge.exe 82 PID 2216 wrote to memory of 2856 2216 msedge.exe 82 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 1408 2216 msedge.exe 83 PID 2216 wrote to memory of 5276 2216 msedge.exe 84 PID 2216 wrote to memory of 5276 2216 msedge.exe 84 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85 PID 2216 wrote to memory of 2604 2216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1ebb3b8a78cea6db1e3a109a4823a7b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae23946f8,0x7ffae2394708,0x7ffae23947182⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17126214070977470180,12505757694794493377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD5b8931ee039ec19e5c0388caa1255f713
SHA18a2d3a4df0365cd9ed4c9dd4101b5d77eac9c2a9
SHA256265d28cbbac63f2e53141f6e8f9f1d44b82908a1c80ac34ecee1b931b0f4061a
SHA512954dfc76e83bb36af30e875e96e46b7a1a13bd5f3593b4b16b4330d66db58c96d432baf79496d48d1fb40b48c605f7d005995669ac06c063036bb6256c95c331
-
Filesize
6KB
MD59ad7c5d028929a57bbbbf60954d346cc
SHA1f95fde6ce95df0a8787dc43eeee7be97acfbd7d7
SHA256ccf7aa75b0a7de879c0c9488858a633d6595fc01913a7109f41c7561f9acfc07
SHA51228fe500e05044c9dda4abec76477ad4de9fafeb065633803c53964ab49f91004d0d87a2461996800e88038645596add002926345540e179e651ff7aca98a0153
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5342c0fa5cc622cede022fb8257b97443
SHA173cc655809bb7294005e13bf5239fc539a8031e2
SHA2561a230234725790c758d658f3be940f80c0a76a27372b66ec075d31ee7332bc85
SHA512aaed616b266e089d64a01720072cce3e3e04035b9999040585ee8d79cfce7dfc9fbe4117082217bd13220821bbce59f85860fe3610dd594f1d59e41728594bcf