Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
267d014c62894dd8509b3dfc1579840f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
267d014c62894dd8509b3dfc1579840f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
267d014c62894dd8509b3dfc1579840f_JaffaCakes118.html
-
Size
7KB
-
MD5
267d014c62894dd8509b3dfc1579840f
-
SHA1
889e8c024d6c7b535ae4cfb59995487d4a2e838b
-
SHA256
25e1178006107827b61c7c5bc6a5a0dbdc4f9e9ba6ba3fa07d79ef6118d53d68
-
SHA512
fc3abb3b6a26aee8d1db911a2a715411f77b9badabfc917f784803013e64fe2ccc61bf51d53cea5d361ccf99fd543d51e2edfc437c3200a152691f21a0f22fe3
-
SSDEEP
192:PI/b0ZUIwKnB/uxyQGCoLBkwLejUIaUQkZQlHX41/TU:Q/dIwE/u1GCoVkwLejUItQkZQlHXc/TU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3528 msedge.exe 3528 msedge.exe 2260 identity_helper.exe 2260 identity_helper.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 2776 3528 msedge.exe 80 PID 3528 wrote to memory of 2776 3528 msedge.exe 80 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 912 3528 msedge.exe 82 PID 3528 wrote to memory of 3940 3528 msedge.exe 83 PID 3528 wrote to memory of 3940 3528 msedge.exe 83 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84 PID 3528 wrote to memory of 1836 3528 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\267d014c62894dd8509b3dfc1579840f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffde3d446f8,0x7ffde3d44708,0x7ffde3d447182⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,15675835601287400813,4023707755158902520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
376B
MD5c8341334ad5f1f2d4e9571ceae4120db
SHA1cf86a728030854332d6f88f021260fb445deb063
SHA25609d905bdc546f10ec2f9d8442eb5ff40dbe863b36390ed946a367aa4711c72c1
SHA512ddede5e078d28731089810e6c22ca96aa6f577f468ea747ce708170ee6f32fac477b507d36929772c884499de14d67a1cd1970f65f495bcb65887a172249f2aa
-
Filesize
6KB
MD5e321e72885654fdbcc4508eadea4c958
SHA19ad3b179f47a34331a7855d54bb0139d1fc84ff9
SHA2562af3bc1efe80511787dcf615e67dc9bc3b8241d67dc80c30b8cbc50f90b33bce
SHA512377452f31ff247a0825c76c2e37e9b69136fc3b3ff7ba3a8cc6a0433d14dd59714ed30980a2f193f33ae61570bf18e21920c5dbbe6cce636823347360d006ade
-
Filesize
6KB
MD5eec94aec144d2c57d1d40da3bd16af39
SHA11d6d14c36000d93e13b2e30a3b6b1892067d701e
SHA2560430e7c30314cf68f98251afbdbb6658d146549f88ee2b54882a917426d42ae2
SHA512394840f80ec4358a2652703bbc7dab5fa325629c2e89ef7400e86d3f546ff97af4fa405391df42195ceaadb68b2cd756e9a2c19b8dbfe73f4ca129a20566f92c
-
Filesize
6KB
MD5674497b104ed9058599a319ae6314d92
SHA152cfc2450c644859d7e1de9d146fa7221534cd91
SHA2563c8b117b31ff00c5cc9141a27e0e5b78aeb6e481bf49b8080c36db1a51682545
SHA5122f8356b6375c56e64705d87528d7e205e06d982874294fb1b7aa10662a3223454a3eba49edde6bcd4989e2f33d70c9f7456967d279225e29e9c9657b26da78ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51c168bd44fea837dfaea10f53773f7e1
SHA1f152fd232c49df8934bf8097c67708fb9798c979
SHA256b0cf0e1aa1ed1d370ad3c5e2df95125dad10439cbca2e149e6cfb9f357fe0851
SHA512babb26f7058de92775915b7f8577761cfc4287c90ee76cd662ef6dfa4aadaf31bb5069363d2fa2bf551579397753ec2d1230e3d27b500a0db8f9042049cd7dd9