Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
-
Size
460KB
-
MD5
202e56864a0ad1f6b020023fd8fb0812
-
SHA1
2796645a9dcada41b76f8caa94112d3dccea17ba
-
SHA256
c09ae9a86319b3e3ef58a4650749f225f27e260de3c5c451045d3f402beec9f7
-
SHA512
9249ec1e41fcfdb377819c8502f4b4c1667766e84d0a59a160bddfe6ac66909784d952e49c18482faa1f3a91e54226a0473cb71270f95ad8d98e8d4c212dca9b
-
SSDEEP
6144:SCsMYod+X3oI+YisMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:75d+X365d+X385d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1872 msedge.exe 1872 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 4296 1872 msedge.exe 83 PID 1872 wrote to memory of 4296 1872 msedge.exe 83 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1144 1872 msedge.exe 84 PID 1872 wrote to memory of 1852 1872 msedge.exe 85 PID 1872 wrote to memory of 1852 1872 msedge.exe 85 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86 PID 1872 wrote to memory of 2024 1872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff320e46f8,0x7fff320e4708,0x7fff320e47182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9931196941082855823,18390132620652578322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
5KB
MD5dbda2eccee135d23b0a1d320962a205d
SHA154d9433b4e96a2b6cbf2e8fba7fa1c64f2462df6
SHA256189e90b9ab5ba52715df04071e8264cd86ab9869768041b8cc1e57ede4f9249a
SHA51214fa89f5a8eb3e8ab9d32500238a635d547bec697b0be0749649e137aaf205848fcfa8e619cd3513493a9a3e0db7a6bbd8a75942f72ebee5a850701ae1ca99f0
-
Filesize
6KB
MD5f5907b5a9fc4a6458decd8cdcff9c806
SHA185f59208c7ddff3211640755001d6e1e7d6489bc
SHA256ce08ebdf1835394205b1be9848e6f60fde263a0aae8a40592aff1c0018b016ae
SHA512b7817bb830419405d04f25afb43bff72bfe8eff80542389c98371b29e25c71fbce801181d40db4a69009c802989a1d414c53cdafb28238914a6f1d6b6fbab1f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD580ac917667d8cb8ff641bfdb2e36d7b7
SHA188f994deb9ad27373b4754ff36e9657f7c202a10
SHA256883a86f6d4aeb76ab668d5200b93546df74dd6708b86b01a16232c2bf70e34a2
SHA5121e361a72b154c72be8486cb5cafb58be50ff0f11199f8f170cdc525eda73fa6d4f8761b8f39f7a7bbfcb674945fbd340b8467029bb4b6f5bf12950bdaae41a25