Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
3aac8506bea166c602bbf7e9b54f40be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3aac8506bea166c602bbf7e9b54f40be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3aac8506bea166c602bbf7e9b54f40be_JaffaCakes118.html
-
Size
11KB
-
MD5
3aac8506bea166c602bbf7e9b54f40be
-
SHA1
63eaccc5763fab181139c7ed0f9203d37f5d4da6
-
SHA256
cd45de92c3f3f2c992a83241c36cd74f0b6c7ae6bea43c66409e64368080954b
-
SHA512
a84ada3475a8d9f66874c0da4f21bb96db2ff29eb3a1a7bc037a65d188eb46fbdc143a0a6029d0dbb1df6dd8f73d90245ba3b47fe6aeeeef0d345ce3525e0da8
-
SSDEEP
192:mdI3N5OO6gHkValrm0TLS2ksmDH6KmAIPTYQxPgPiaYk:UIUgji062ks06KnOTdCPUk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 636 msedge.exe 636 msedge.exe 4828 msedge.exe 4828 msedge.exe 1280 identity_helper.exe 1280 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1152 4828 msedge.exe 82 PID 4828 wrote to memory of 1152 4828 msedge.exe 82 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 2264 4828 msedge.exe 83 PID 4828 wrote to memory of 636 4828 msedge.exe 84 PID 4828 wrote to memory of 636 4828 msedge.exe 84 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85 PID 4828 wrote to memory of 4936 4828 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3aac8506bea166c602bbf7e9b54f40be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd944946f8,0x7ffd94494708,0x7ffd944947182⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10339708081578691632,1712672849447682054,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD518158ddd0bee7e18f9785ea97ccda944
SHA1d7e20605e5ebef5040267a70c90e744e2144e3f1
SHA256f17d6f66ad1cc6518a6c9880ba25f02951ac62886cba6a080ba643e04c8d2873
SHA51273f455187aae00e0473b1d3db24715e7e10779af88865cf5e90d8a263a0f9073265aad7678ce96a003f8eae091fa772e91c190dded871745bea6821f81a92c61
-
Filesize
6KB
MD5ca3fee0050dd1954bfa0b05681121f4e
SHA16ac001142dd9e6ca8cd1f11aa3acd21ed1157bd4
SHA256ec001dd4a87fa2f9c9d4efcb750b3028625bd3a775d36b58f4dc75ac03e716a3
SHA512adeebfb4bd999bbcaa9dce4254197532a675b5d04c72d9d446f9d86e9f39bc805915749406684779af33ba8455da43203f6689c088bdca1bc6c024f550abb0a6
-
Filesize
6KB
MD52183ce52fdc5b0b31544b27a59c56411
SHA18754ea1e62a3289d531d040ba97042987cf24f46
SHA256b0c013a79d13fc3e897e86172eec64a7db55219ca9e141d62713209ed714fd5a
SHA5123e74e29bdaa860920d6c3f2401666798988562934cb20229daa0229f2c7c31845713a03d5fdcb76e33602d0311338e2801567d45133b9f9c4dede18a5f6b0cf8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51ee38d3921a9cd88c8a5a6cc1a1a7284
SHA13dfaa0b72bdddc868d7e945005439ba946f71470
SHA25674e0875bef5afabde72ece43e9225251fb7a3228626bad5ebd4f15e44d687209
SHA512a8cdeaf693aba50fa19ef4b4ea5eb4ef576ba804c211fbc7e2f7f7d677bb24f7d14e7e1e6ef74a92b5876f107d992901672eea43d9f6469037c0f6a84a8d0a5b