Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
304fd291eb30e4d2f2fc4b4029159c3d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
304fd291eb30e4d2f2fc4b4029159c3d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
304fd291eb30e4d2f2fc4b4029159c3d_JaffaCakes118.html
-
Size
86KB
-
MD5
304fd291eb30e4d2f2fc4b4029159c3d
-
SHA1
5c6cf5d724b9b24ccc71f73ab7e083531a4d631f
-
SHA256
9047bab670e5a11c883fa69f174da897514f96c0fd5a0df2f5f8c53e7acd3d47
-
SHA512
4ce9773eb5277798b4838280620b564223c1f3cfcedb64dee60ed760e194f2082c370622f584dd1c8344f9a42c1fbd062d1ce2673577876d1b6be5a27b1e062c
-
SSDEEP
1536:zLqX4yJnuu4F2k2vsKAt7+4O/k/M/x/d/w/f/n/Z/V/B///LhHUjv6PiXB5kMl/S:z0aF2k2khU6PsTZ9f1phzYKM1/F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4716 msedge.exe 4716 msedge.exe 3796 identity_helper.exe 3796 identity_helper.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3232 4716 msedge.exe 84 PID 4716 wrote to memory of 3232 4716 msedge.exe 84 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 448 4716 msedge.exe 85 PID 4716 wrote to memory of 4960 4716 msedge.exe 86 PID 4716 wrote to memory of 4960 4716 msedge.exe 86 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87 PID 4716 wrote to memory of 652 4716 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\304fd291eb30e4d2f2fc4b4029159c3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc5d46f8,0x7ffffc5d4708,0x7ffffc5d47182⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1708 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,2928740212600374812,17689702778182606956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
1KB
MD5c1c83ec4db471f429ce0c07f43345d0d
SHA10da12926ad0193a4a7e323455c7d6e0bda9e504e
SHA25626fa4292ba8623d5c74bdd6cc055d4ddc5e35f4af92f47431a4bb018a605b04d
SHA512ef784e4c716510be05a1a7ac7651a6585fbca8a5cd9d0a1d2c96f6aedec839d4a863a086f3e55709713eb1b7d3942a63c2c03de7de5b68617260efc73700e61c
-
Filesize
5KB
MD5bca3779f263e0ff583264bd01b9aa027
SHA1fa0c23b45eec1c8801670bfeb877d3cd1ffd235b
SHA256854d073bfc2e4be58dcef6603ffa96cc47c94cfc9db88887be2b71723b707aac
SHA51214c8882e559b45ceb90e27ccf7ac4afcc6465e2a3d1b40e8088a3f9045577d33c115bfb2ccb839c2070a3a62ad19b3f2f38d7c4ae27f040f74d851aa6181b130
-
Filesize
6KB
MD5eaf105fe2d5bb0c5c6c06cfd3cdb3e77
SHA14f6d464c83aeee0efd6ef1fb532c663e57c77ff0
SHA256439b5acad91a0a9b33c884bd80b55688b1532a11ca24deed12f64e3c77cb6bfc
SHA5120895e635de24f9ec72ae7711493c4a115bf07d3115239fb0ed9bea778411ea4a324240fe305001312791a311b00298f31ee87e3749ac97871fa6b10cb47f1205
-
Filesize
6KB
MD50e7a8c68e3cc4ec90d38077f28e1268b
SHA1d12d71c7fef99110fcfe25a285fe3b2a4134e448
SHA256325243c2bdaf2a3412cdd081e340c0ce09bc7ded0455b37cef817190e5dd54a7
SHA5122b4443ea5935c74d3253d7a975a7598a170ecd09af0f828b556b5ddb791095e8626cfed537dce66426785e6a6d07e6b723531edcaa5a19568de101d77fa90553
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a6a7dca7fc964c13de8a6defef090be3
SHA18e9230f009c7be38a1267999d9133c49728b7760
SHA25635abfb352982a9e360e6d77588795b010ba4c3741383e249eca01365b30e64c6
SHA512858321c1f537168ccbd8052329636ef85d07addb0efacab09204a022695cfd7a01ad8a1ed6195a84d1f1c03a422184d760dc56e6ba26ab9aff9af35728f786c9