Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
-
Size
25KB
-
MD5
395332cb67003493c83b42dc2119f83e
-
SHA1
65307ac2e7540472f4ba748b5cdd2067b4a74004
-
SHA256
08eb70f2e8d329f7c1fe3eabf476994243d7cd83098f1e4109b16c2e5db449d9
-
SHA512
7626003f47ffd139a778affe0d556e51652289c340abaf1dd9dbb0e58088f800a43e6d0e61d2ceaf9604866aef825e2657c536c09158cd0f480b7ad6ab7077bf
-
SSDEEP
384:kK8lhGEuZtFpeJiZjdlbGlbRlb8yRqF7XlbOUG251GV:d8lhGEa9lbGlbRlb8lbdGV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 4160 msedge.exe 4160 msedge.exe 540 identity_helper.exe 540 identity_helper.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3896 4160 msedge.exe 82 PID 4160 wrote to memory of 3896 4160 msedge.exe 82 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 3972 4160 msedge.exe 83 PID 4160 wrote to memory of 1132 4160 msedge.exe 84 PID 4160 wrote to memory of 1132 4160 msedge.exe 84 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85 PID 4160 wrote to memory of 3444 4160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\395332cb67003493c83b42dc2119f83e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10316921552774904183,1512310053965329869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD585b06c198855967df5fcf85b5d5a8231
SHA1afda231cbca557bfb6248f9625b20c8e12a7f862
SHA2563f756bcf7a75be7a718f141887839231a11fa3250277b84730b0ea3ce5d88322
SHA512b66b20feff4b6148103e20b424e7e34cd934c598005c571bf645dda647674ecbe6876f7c8cca70aba1fae74a20964d817c4e47b8ae60d4d47bba285c4eee040b
-
Filesize
6KB
MD58c9d11043fd5a8924cbd1057b87b7bab
SHA144d7be773be50ee39fc85bc7a77ba510c8bd90d2
SHA25663b82b627e9ad8e4455776ee2138d30d6238571d4f2383224bb69051910eca8c
SHA5122ab78d6a9f8ac53766cdd3ba27e8335a310fb13a7b490d9fd6c985dc5575d2ea57be5d8e314c42023d61916119a06926d3dc0bc4248faf991264597297d4af3a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e78d9fa32accd604b8ba8f7fd69949bd
SHA116e44b2cf75f18453fe5a94428f8da1cf8a761a6
SHA256c1198cb9d5840b9fbc430da50bb5eb7a530039dc3065d7584bd60c63643e8060
SHA5123214b4879a294cb1e22197098a13b060fef565a2b3a77f1e5e9ec5139b7d33dc303c2b371800fd71bba7cc0c68e36a6bfad44c79116471c87153ce7b87134783