Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
22022540093dcdc03e4228ef1f161f9d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
22022540093dcdc03e4228ef1f161f9d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22022540093dcdc03e4228ef1f161f9d_JaffaCakes118.html
-
Size
18KB
-
MD5
22022540093dcdc03e4228ef1f161f9d
-
SHA1
6ad00ce7df7aed4bf9a302c44766bd803b522ae1
-
SHA256
6bf9b1ae8a44dd3c8181ca7a4cf036de707d8731f3e16b94065eed3a616b82fb
-
SHA512
4f89f8b1e6f081b1964a0b346348c92c29e13bfb0788014a5e36f7e0723235ecc6ca606f5a69ea97fa5721f84e0249648b9f1e30047e0ec95ff74a5eb0f8ac58
-
SSDEEP
192:9K/ypUhTniq8LTgE9d33uVMC0jQhtUhv1MlUx9V6cxjb79DXSviFIiC:4/yoTnixLXf8MQh2tp55iviiiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3160 msedge.exe 3160 msedge.exe 3432 identity_helper.exe 3432 identity_helper.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3276 3160 msedge.exe 83 PID 3160 wrote to memory of 3276 3160 msedge.exe 83 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 756 3160 msedge.exe 84 PID 3160 wrote to memory of 3560 3160 msedge.exe 85 PID 3160 wrote to memory of 3560 3160 msedge.exe 85 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86 PID 3160 wrote to memory of 3116 3160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22022540093dcdc03e4228ef1f161f9d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf99146f8,0x7ffdf9914708,0x7ffdf99147182⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2306887958461933949,10899663516762824029,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
1KB
MD5eb61b8aa0700e7316f6ca7b64aef8835
SHA15b0294c8597b3f1fe4b9351e2798316603ad2123
SHA25678a25277831648464befde0f33d0468409132c877167a9d8fe3add76a63868df
SHA51217ead1f56d03b8dddeaded6f53ad88bd67d56f9304b34f4c33724afd29407d26fc114a819ec176c6e6dbfbc8c26d142fa9a2ff4bbbaf795de12e229d9ecf673b
-
Filesize
6KB
MD59a4e9f8395356b734541ae565f56e5d8
SHA1cf74da52b87cf3e5eecb10f224e8ec9c7c76ab38
SHA256181e61310a1f56d68b6c54f2b4185c52cbd127e702df22050673894f8e5833cb
SHA512ab4c00e1962248a39e998eda6f74246ddecda89092dfc1528f0e9bb9d30ae995bc8bbe34d6d6a2dd96d8cc6085db1799f0e456205b776acdc7fde4ee766832ee
-
Filesize
5KB
MD559489dff6dd7243845255a93146b78c6
SHA1120d9b192282608cc9ffc6c5585b26df043e9eab
SHA256fa5e2ded4658b72dcc0e80666f35f80391c50665ff1598e217929eca59ec2323
SHA512a538fa84b14ea4e5151bb11ff32a54314570b903b6ea4a844d73bac9df5d071abc07a07f037819374235f1e9dfcd0041b2467963b3c1b9da67ccfd1efbe0f2e4
-
Filesize
6KB
MD51703418433d9a71b51cd4be742206d37
SHA19a9f64f3dcdc91b8b76ff1f0e7d797b9bf3a666c
SHA256c7de9d628716244bfa7da18d9895b1a07105bc923eafc52edd368de1493281f3
SHA512fb1398e7d72d01a553e5b2c40161e9dab5167a034548ed211714ac63f046fd45a989398756e019e4de59b2a3c82fbb72dbe822aec83d7024a8e5833af7647da6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c526f4edf74252275be9a029d6b66248
SHA1c95369f2d1ca85b1107d04776c09e1079a42fe29
SHA2566af0f670808ba36958d155e3a78f702617de0985937774968ccd484ab7f45512
SHA512a771e394e39f0bed1aa6c691de3faa992d7863159b7f66345f70eb205272604da61cae698ebe254d8420462abe14c9d49c62a08ce9e8ccd4127260f5b9b03a72