Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
30c1aa5437f088702c88b0a8fad0b29c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30c1aa5437f088702c88b0a8fad0b29c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
30c1aa5437f088702c88b0a8fad0b29c_JaffaCakes118.html
-
Size
99KB
-
MD5
30c1aa5437f088702c88b0a8fad0b29c
-
SHA1
457542b5924e1595f1f050e25fae13832709e6b5
-
SHA256
cefabc05c0c039cc2c4ddeb0ed633e84cf20b3885ead3d235f563007652c484b
-
SHA512
0ac28dad04186f948160c95fff94fdcb410cce6dfa42a527118d1747eb54c3b8e8151c7d807895584f962f544d219ae5738b7ef524f96b1a530904bc7fed9d75
-
SSDEEP
3072:aeuguH9+GCAterYipugk27X6ZR4u4Y8gQiu:aesH9+GCpYipugV76R4u4Ye
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 3788 msedge.exe 3788 msedge.exe 2016 identity_helper.exe 2016 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4680 3788 msedge.exe 81 PID 3788 wrote to memory of 4680 3788 msedge.exe 81 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 3768 3788 msedge.exe 83 PID 3788 wrote to memory of 4980 3788 msedge.exe 84 PID 3788 wrote to memory of 4980 3788 msedge.exe 84 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85 PID 3788 wrote to memory of 3448 3788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30c1aa5437f088702c88b0a8fad0b29c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5042795741551760811,15034957318953842586,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD5af4a9af363fd2b210e1a81589ec09c8e
SHA1a74d65efa944f90c9ade7bb5a476b8681e274e90
SHA2567bb1ab7a1070a730e0fb67f0930d891c109f0bd8df0d610cdce8c07a29d6a29d
SHA51261ff84ee7a88c7b030e5c92a1525a98b08b07d5f5f8bf382a7413930474993cf504d8e7193fcfbf11e27ece5a1aa8b796d954ec884503b9934e3243a719103d2
-
Filesize
6KB
MD5dfbad5beaff59cf0f053d364504b6cfc
SHA14bd7c7cd8a7de02b2a6d00edb1551c42cbd54c9f
SHA256b28be559a8968497205be94d0771c4a2be5c2a0898b221d66ee074d33d133768
SHA5126ea72541629bceb2fb8450a3292ed6ac2b5078960f9a1244574490243f8118e2dff905ab011c2c6ad1b10d233ea6a71730879e8fcfebeebfc5d141795da287b7
-
Filesize
6KB
MD51503b9dd115d5bbbc19b0e7e9bb9dd16
SHA12b3e703340593925ddda6450fc4d5b4bb7c5fdd4
SHA256b03ecc4968b83fa5a7469e4052132ca1226fe06115943ce591a766ffff13137d
SHA5121c33132f8b6f27d4fdb2f5397335780421f35328fbcafe31cebc57544d672b3d6665a0374a43d430210482fc8ab533d3d4452969c5ebb0aeeecbc3908c6f9f9e
-
Filesize
6KB
MD5d7a317e7a4dfe08337b275a7f0693022
SHA1faf0e82031e2f353a4ef971b4d18995f5a398851
SHA2563fecde133f76af6d8ca013ec5cd8964fbe1aab2edbbd7cd9771031950126a865
SHA51202272001254606b28139ab3d3520f6fbbc4bee43e270006292e9351fc88fba798fb30bd29e584eb582b473a46c358b714114e97ef180a771e3eec677e9a943f1
-
Filesize
706B
MD52de53481d8fc83c928f77129ff490d39
SHA1f36cd06f01055e186a0449c176e3725a801b3035
SHA25685af4a5de56c12eff8e6b7bb3f72759cac76788532c64cc209af8b51f7b79603
SHA51221e5b3e6f7e14b048375f092fdfda2487342ab49b78919476f2e8a97869eb51c11d18ac3a7b603d88a0e2a9ad2cacc746cb26a1bcdf2af6a4323f82a6048f553
-
Filesize
1KB
MD58ea063d43ece654637b41ac91b1861a3
SHA1cd91b9c42918e4545c02650f645474fedfe04dbf
SHA2568ffebbf46769109f7ca34143b19a5919bd5a92bb243763898792e5fb4298dd12
SHA512e78f0eb1edfe4109b3d3fab5f94ccc8cd98fc510f4551e0c49019470222eee5730b59ac80639bd8bf5c4008a96439743f3bcee7899414b5ff57a5972c7e50179
-
Filesize
539B
MD53b51823e1b16bbb316134e874f640d15
SHA1530fbda285f4083e0a74dc7dff3a862687700278
SHA256f03732d60e13efe844575c2d716c5077cbb432d051aa641c9f9da5166dbfe812
SHA5127abf033bd6a0c7e7c32f612b5274058dd2a60b608434905eab9ba6d54cb19450b34237a475816518ed852e6093a9ceb7cd0b96525fb099abfa1b838d54395219
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b35f59a349acb30d734eba87f151eb0b
SHA100efcedc6010be6f3d47a1133ab68167dec5e248
SHA2568e8ac66f0eaecacc06e9ebaa988f9bf33e27bedf815be5f904b7dc91bbb324e8
SHA512b74a7f21a6abcdbe3fb9a4d160e859051d68e792c226c0175c61bced7cc9fd20e7f01ea53fa19cc479fa7d8b19755bb6238e2abb43db53d2ac99943f14e195d9