Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
2c0864b5c4f4b2bdf1ead00ff62167fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c0864b5c4f4b2bdf1ead00ff62167fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c0864b5c4f4b2bdf1ead00ff62167fc_JaffaCakes118.html
-
Size
23KB
-
MD5
2c0864b5c4f4b2bdf1ead00ff62167fc
-
SHA1
96efe72bbc9ed1d9d9bd758a2b69a6944274809a
-
SHA256
54bdfb56d4c115f81be5a6a85a4c9bc2ec3ac6979e83bebbe6b5b67cbc23ae1d
-
SHA512
9b0958b57d5f387ec9b56dd570224ccd486e4c4692714dc899c7c4f1df1e754beebe137a7df33617e3edb138a124e1593a555fb104a0e6a0cac43add3e338798
-
SSDEEP
384:SdtRrd2iDEsWgVfvuamV4UviYyPfkp4v2ytKGE5zbTIWCcFibDR:SdpR5fv/u4UviY/vYK1FsDR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 448 msedge.exe 448 msedge.exe 4744 msedge.exe 4744 msedge.exe 1316 identity_helper.exe 1316 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1032 4744 msedge.exe 83 PID 4744 wrote to memory of 1032 4744 msedge.exe 83 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 1368 4744 msedge.exe 84 PID 4744 wrote to memory of 448 4744 msedge.exe 85 PID 4744 wrote to memory of 448 4744 msedge.exe 85 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86 PID 4744 wrote to memory of 1276 4744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c0864b5c4f4b2bdf1ead00ff62167fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaa6046f8,0x7ffbaa604708,0x7ffbaa6047182⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,16995069451397630758,8276417732713463798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
190B
MD5463d59f1fa78af9bfa77563be043c514
SHA12d779a2bdda47790c80710d03f4029a7cbea0c5a
SHA256205a6169a9b89546e0d4fe3a574cb44681552119063f535f73374537197986b5
SHA51241056ff76861fdbcade1a19c71bb21d8665d6f3453e363df671241b92bfea5a63c12fc2e7ebef3687c929354977cca51c897332fd2277314fa03973348903650
-
Filesize
5KB
MD5507a8be644f5d7b30f53686c56593ef3
SHA19cf9a479c914fc99764c5d4a93744a8160cb906b
SHA256f19e06f0e910b44bcee7e98db9ebb0d1e15804bcb3f8058588f292f218eed268
SHA51236ce61ca1b8c123a91b6bafe86785d539a9188db9621a1617b1cfe20d9ea9247d163cc060b7bc763ce8844ae128323debcd69d40ade274af9ef4f89140f1357b
-
Filesize
6KB
MD5b05f60db48f2b0161e88b43566becb45
SHA1d23f92a44c7922e16a826eed339fc315be967c33
SHA256beb58f144d7f0711e6114ee8f33c483377511b9d45615cf102c2ecb92ae0c703
SHA51227cb76dad0bb28c869ac9c2e631aae1a7d3e85db85d79e8cfcebe84b981aa8fbec3f5e3a6a43249844607bdf7f0c465851f7cc818be41d4c794cf66ec5733a3d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57a789e5c52bddb37b804366840a686ab
SHA1cb3b7e9c51e06a66e30d9678450fa5a48a706607
SHA2562b33b9f336f18162f7fde94398a0243189a86ee4485da28bdc7012327d64f36c
SHA51272965d3069745550a0a3639bd050cd9d4927acffddbdfee28a7de1d2634031fcc81097ac3f3fb5c08cc8f3a34a295c5cc2d22d5f881f3a2347b68f0d5f06efae