Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
366ffa369e0954b021e5b1473bc9ca60_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
366ffa369e0954b021e5b1473bc9ca60_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
366ffa369e0954b021e5b1473bc9ca60_JaffaCakes118.html
-
Size
23KB
-
MD5
366ffa369e0954b021e5b1473bc9ca60
-
SHA1
105245ef055b1af4fcdd008bdc4a2c53d7d4842a
-
SHA256
3bbadccaa050506217deffb72bfeb2197487b5ef8694bf186ac5ef68b25b8fb1
-
SHA512
25a3730393c0596e09c64c2a775a9447db727d041fc1422c3ef591e38cc72e621a659cd1e51e6fcd96c4c11222498e17573f3d8c076c30f63848598e756e7af7
-
SSDEEP
192:uWFkON53Y5rtb5n6/CsDwOyBGsRpGGSFnQjxn5Q/InQiecoNniEipnQOkEntUrmL:mQ/Byd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 4068 msedge.exe 4068 msedge.exe 4952 identity_helper.exe 4952 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1784 4068 msedge.exe 81 PID 4068 wrote to memory of 1784 4068 msedge.exe 81 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2340 4068 msedge.exe 82 PID 4068 wrote to memory of 2744 4068 msedge.exe 83 PID 4068 wrote to memory of 2744 4068 msedge.exe 83 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84 PID 4068 wrote to memory of 2108 4068 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\366ffa369e0954b021e5b1473bc9ca60_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10579555686945474820,907969693769556618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5d4e66bc1d0369cdd59894e6be0c63176
SHA1f27035cf648731439ad30f8dc69d3631939b0716
SHA256e8f654f9717e347e55c403be2fd60c95baa9588bd8a93600ecdf8cac3947e7c5
SHA51295fae1d367973b08c1d000dd82e686822a1ddbbcc68283deeb712697cc0404f2db23f437406c7c99dba114ed60310bf0a82820e34fcdcf7e65629e65e1305183
-
Filesize
6KB
MD5fdb35d42454bb247998de1d5bdbf38fc
SHA1169dbf8c24cd963d5a244b87112e387a4c8bcea3
SHA256b9c42a517a6ad67e5c765546e721028898db32c184bc5efde51c87fbe45a001b
SHA512c4dcd909554d992a7b6ccc2d0249258c4cda0e4494b973c1995d037f250c7daba8ea865f0abb2ece3bddf36ef7fea66e7fb62433ff6d5ffd66ae95caf9422df2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b1224f1ab0c11fdbdf92c928be0be3b
SHA1af680410a4082c05ec12537cb40c9ab1910e82be
SHA256323e2b0ca1810283eeaa86471e08f8ea17b7762904e8e4baaa895ca1c63218bd
SHA51209d563ab458257b9816ee5e11180779529ba7c81769f5c70bd115ab083fbde1becb13fb943e1644bfe046d71cca9f6e2ea4689ab60ece064bc96f122e2cf8040