Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
2bce0db37db0c53b58b455a1f1a3d0e3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bce0db37db0c53b58b455a1f1a3d0e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bce0db37db0c53b58b455a1f1a3d0e3_JaffaCakes118.html
-
Size
9KB
-
MD5
2bce0db37db0c53b58b455a1f1a3d0e3
-
SHA1
32d4bab9cbaa06396757548b2f0003270b57ef32
-
SHA256
c4820b183c45ddfdd9d8b193ce6c4ca71cd442288709d17540ad94f341c256ad
-
SHA512
bd3db3bac21f72f892efca46c4e3200fd4fa96b4936cb445a814af832c21306f72cfb705cd172d67f962b870d580a38cf89d41e56725d9803839772a4624175b
-
SSDEEP
192:UzB+3wf3xxI51Sa+1IiZtsP8frhO18unmayYUzup/tFFPWe9bIbXLdIyoIe:U2wZxI51SaOIgtsP8frhFgmayYU+/oen
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 4728 msedge.exe 4728 msedge.exe 3448 identity_helper.exe 3448 identity_helper.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4172 4728 msedge.exe 81 PID 4728 wrote to memory of 4172 4728 msedge.exe 81 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1544 4728 msedge.exe 82 PID 4728 wrote to memory of 1924 4728 msedge.exe 83 PID 4728 wrote to memory of 1924 4728 msedge.exe 83 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84 PID 4728 wrote to memory of 1920 4728 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bce0db37db0c53b58b455a1f1a3d0e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc763c46f8,0x7ffc763c4708,0x7ffc763c47182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9302682807209990917,15348285564215061742,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
522B
MD54c72d839940b658c8739100f54768f9a
SHA17d7c91aee03e2cbf8039fd20685aa60be0179efc
SHA256204ba208744fa31a8e85c982890152b8dbde3391bef27f354a5cda7c486a97b2
SHA5121713ad52dc241b02bfe8ee0772f1e155018a2265ce7679129a0b09630d5300202cf6624f7006540c510e717c623fd20c9dc2e2c065788f35feef112643be2b10
-
Filesize
6KB
MD53ec1f64d16b08eee6cfbe9a1e095e64e
SHA17a6f58553b59a3487ed75ba17f50eba627937436
SHA2568360439c5182865be789c52f1d31ad1e80b692c943861de15efdac1508aa0e4f
SHA5129c02d8b61a37c7f541429b6667df6920c08c62e97c4aad8f95e1ad6def1e405eb219c62e9c72460957ab0eda63ce2daa018d28b51d960f034d10ac613a042cba
-
Filesize
6KB
MD52a906365b0502ae8ed66b8045f885816
SHA1591dc9ef88df8c199353c4435bff6080135972d8
SHA2566164d39294079dd4fae54e4493974864bf3d0b6e67bbb3271b12da567c6d3664
SHA512e52c168db009e694af27230f02c1a5428f1d834886e407e441d70550eafaaa413179f2511a17042c0ef8e489bb654b8708865a6f39151efd3facd39c6cd57bec
-
Filesize
539B
MD530e9046bbbebe9a1e60ada4ddd2a1513
SHA1ecc96e3b278c882622d6b686e1655ec1240cdfca
SHA25621fb4dd5e0bda9a26a424164eea1564d69af2cc905f2a0e39397881a1ca3aa7a
SHA5125515b88c91efd6e3f519a52aea69caa01e762845a8c9f68ef18eb4a86170f823da440242103f422f7d31d4253cd8964ca029b2fc44e2f40a4c39b5d1fa26d617
-
Filesize
539B
MD5abf8d5523f8899522b1f50e730d86b9d
SHA1a1a977a3919bc6cf4cea6542c069dabebdbb5387
SHA256b9e52c7198d74dcef763bf11af649f1c545a2871443858332dedfa72fe93c2b7
SHA51206b08386d0075fcc6d388fa0c0f8108eef0cf0dbddf83581cf03d815001cb79585c5fb4235321bfeff189883ebc4e76bce7a95cbc1b24b558774bf4dcd14b5f8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD584d46953727ac80c3effbe7bb530a458
SHA1dc07451de924969136992074d1c1526315247e9e
SHA2567c4287b1c3312b2c7f5d64360e502bc2d83fe98bd59e3a6b9b1a9fab43255899
SHA5121bf4c81e80bf7b3968c045a4812c9a3dafc7e23def5579797dbac8957e4b49959f745804d9b67b2cc061ebe5ea7f0f601553a3f6070549e5941e539729ffffbd