Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
32fbeb0c304144a414f8c9e76a3dc0ea_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32fbeb0c304144a414f8c9e76a3dc0ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32fbeb0c304144a414f8c9e76a3dc0ea_JaffaCakes118.html
-
Size
24KB
-
MD5
32fbeb0c304144a414f8c9e76a3dc0ea
-
SHA1
e0d0ca196764aa3d24bc34870f490a505cbb8198
-
SHA256
d02ac8889cbf4c5a76a3473f0577a7794ef5bd72dde557d0cfbb4765e63f72a2
-
SHA512
ca95c43a9228500acbb5d4fedbf8c69b53cfa21f6590193a83afba3142db52da7702975704c1a0b8e63f49d2d58a7053ed342b7ff4f039734160ee23cffc9fe3
-
SSDEEP
768:SlnniLqBwFGacWjwwGCTj4BTsHlgiTy2RhlNOJz:XqsIWjwwGCTj4FsHlDpLN+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 4152 msedge.exe 4152 msedge.exe 1360 identity_helper.exe 1360 identity_helper.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3280 4152 msedge.exe 83 PID 4152 wrote to memory of 3280 4152 msedge.exe 83 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 4196 4152 msedge.exe 85 PID 4152 wrote to memory of 3064 4152 msedge.exe 86 PID 4152 wrote to memory of 3064 4152 msedge.exe 86 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87 PID 4152 wrote to memory of 3092 4152 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32fbeb0c304144a414f8c9e76a3dc0ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1030381057718051763,6068925524769731715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
189B
MD5443319881835b14fda88caab9945e84c
SHA1adb420bd20774e8eabc4d3d53ecfccb20ae7cb54
SHA256fd79d0831e92ccbffc20eed3a0d07b39a121b4f3be4f720d2981fdd2e7b5b8da
SHA51239c2c7fd638c04ce244473831d3dc8175e8e9ecb9a0df38370300233202d7d7fa9166912b8d97b34efd7b90eab6da376191e1c5c9ce253e96c9686b886ab29fb
-
Filesize
6KB
MD5aa9b0ff091bd2b66a0c1f7dc7670128e
SHA17091d085d409a8f140b72d69fa72e354a7aa447f
SHA25681bf1894a81ac8871cb282ab3edfc1327f03e537c2116fe3274ccf17f24470a7
SHA51243ea4a78b024bb47176f032da085ff39a4730edf6dad5b3035158b96f83c37f5e433c1d2be71703fceefb391e461bd22fca5a5b4ad09b455f07e563726dd8ef6
-
Filesize
6KB
MD5c95b6a43a331af0cff8d01ad627f8f17
SHA162abc04e23e6b03b0f819df6925534a72d040f14
SHA25672e0e45d5df408926fc29ec7c32c54a9900aad263ba5005762e090e0119229d9
SHA512b9f9e031c50a22495261342df6d06c84ddb0bf185382a4bae1b9e9687018a6d63cff420c4ce7e8a5d608fff89af0e0a4570a4e5327e748d9c204077083d16dbb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52c19f9c7984f2eb21bc3e1f449c44c0b
SHA1eb78f68fb3eb0bc158d638f7bf4cf8e17acf5bd9
SHA25603e606a87ec2e3f590539849331f8780ece8ac282460b7ccc7f8bbd3e3f64e43
SHA5120bdffced52f1f2f5ea4ee9138d09be985522435780af833a6ec14fcaca9fc01e4c39bf6b5485c0e92f5e16a5802a97d01bea43c7386b85446a2c44477eabbc64