Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
24d331621bbf17484b8250be93e6fe2f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
24d331621bbf17484b8250be93e6fe2f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24d331621bbf17484b8250be93e6fe2f_JaffaCakes118.html
-
Size
80KB
-
MD5
24d331621bbf17484b8250be93e6fe2f
-
SHA1
1ba4e1ef406fba554ced75ceb70290499b17f212
-
SHA256
c6a8c4e97190ad818d8e916ca5c340946bbd70e826434e882335f8c680f24ce5
-
SHA512
47a3309d7a7c00490db147f163fa5b0cf0588d141cfe9889ed91fbb49db7efdc944a68d7a872ba098cc38fbfe4203fedf5f6f9d544cf98a88b606341f6c9aee2
-
SSDEEP
1536:uGLPMGEXXct1LX3qSSSclTeA7qMeee/oeXeK5l5eweZQewONeGpRL3u6XG8pGLJ/:wXXct1LX3jSlyZewONeGpRL3u6XG8pGN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 1100 msedge.exe 1100 msedge.exe 1712 identity_helper.exe 1712 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1392 1100 msedge.exe 85 PID 1100 wrote to memory of 1392 1100 msedge.exe 85 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 636 1100 msedge.exe 86 PID 1100 wrote to memory of 2092 1100 msedge.exe 87 PID 1100 wrote to memory of 2092 1100 msedge.exe 87 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88 PID 1100 wrote to memory of 2412 1100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24d331621bbf17484b8250be93e6fe2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd55cb46f8,0x7ffd55cb4708,0x7ffd55cb47182⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10487003467548149045,5965629796745757519,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\13fd3a63-c982-4c3d-85a4-7d52ca9dbb35.tmp
Filesize5KB
MD5dfb7ba2f303a8f6bbf19b5780b529689
SHA1890aa938618dc93f111995182978adfb2112e1c8
SHA256de5345426d41bc1ceafb3c19bc093f1ebb9df92885a638c4d48c2283618ca7a3
SHA512f97bf58cc8728b959df0af319f54a0fca7e2f8cc4c034e7775d9ccbeb124c7164bcf8dd6fcbe457f78f95e6222709ed734375458221395985b79d7a66bd4e1fa
-
Filesize
183B
MD56cbed2cd3c0172ee4375c713702a29cf
SHA15a830fa316014b7fc8736e1db697850a3b98800c
SHA2563e4aa9365b317a2dc2d539bd052759b5dbc0169ebc52c665ba42e09154d5f914
SHA5128cba0a36a3cca95c326ea369f89f494b0d04d6901efdd4eebd75606ef5a6ce4c1f4dfac2bc882c3bcd611a296622379138e64378602ac47f346e7ef78f718e0d
-
Filesize
6KB
MD59765a26a68dd54ca5341bf10b40845d6
SHA1a59afb4435cb45eb0c08510a35d8e703e9a1180f
SHA2564137d527fee984a28741dd44b5a8aeba1b8f9bb4d6118924728d324592604719
SHA512d60592763e1a7f04fd9cd76baa35a3e7819f66d09c14b3498d62c7514224496bff288ce330bf716a481590ad93cbdbf5a651151a30d63dd2d0f35e291d7a2cc0
-
Filesize
6KB
MD545fbf647d793161df12d47f831ab1d4f
SHA1c53c05e05eaa1fa07dd2ea8de5518b4707ff6aa1
SHA256cff950ba0997ce16f0a5f31aebc4c235981c6f3153a73058cd57d7d0b27566bc
SHA512be86c76c3c914548c52f4dec9eebe68365f29465d84378741f261a2722f200dfe9915c2af3bca835a8f6cb8210b4b129a0c312a3bdd9a926c12b30e40ca3e240
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD503593905c58c69efed08e9dc0296cde6
SHA1fbfc3ed9100298b267f00ca01c9bd33f12181189
SHA256deb6afc4c6e6b1cdd503f1cf9f1d3e3620f30b660b8f73e20dfb1992598beae9
SHA512efeedcf0d0e489a247cc417b684f9352b1aa0569b105ad2e5ae0ec4799ec589aa2cc18171d7fb7616b6cd1d9bf34f15ee65b45c04c8d7d8b481b231446e3917c