Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
3afffdab2e2df1ad8639a805600ee5b5_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3afffdab2e2df1ad8639a805600ee5b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3afffdab2e2df1ad8639a805600ee5b5_JaffaCakes118.html
-
Size
175KB
-
MD5
3afffdab2e2df1ad8639a805600ee5b5
-
SHA1
35bf7cb5d42ac19a9e037695ed497ab787c95d6b
-
SHA256
141d3af967b7a0ed9c5bc2d7d31c7220889cd47c96335033cc672037f2d23f6b
-
SHA512
b5c081a7e809f5b692f36ab357e9016fce69c1089fd3b52d79b06dba3686b403986ef2d1849deb8b77a1600ed170b24a63c020b1b6031122b90a6636693322ab
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3TGNkF0YfBCJisC+aeTH+WK/Lf1/hmnVSV:SOoT3T/FhBCJigm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 4424 msedge.exe 4424 msedge.exe 3536 identity_helper.exe 3536 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2128 4424 msedge.exe 82 PID 4424 wrote to memory of 2128 4424 msedge.exe 82 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 4552 4424 msedge.exe 83 PID 4424 wrote to memory of 3760 4424 msedge.exe 84 PID 4424 wrote to memory of 3760 4424 msedge.exe 84 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85 PID 4424 wrote to memory of 3988 4424 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3afffdab2e2df1ad8639a805600ee5b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb014846f8,0x7ffb01484708,0x7ffb014847182⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1411168864260123235,7026430811425476542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
360B
MD5973ec63e32dc63ddac1f236b6a13eabf
SHA109c50f862a63641dd4c65f5171e07a47a3f953e5
SHA256a8b8807e1c7d3d259f0b6f3b73a91e4276f32bb641fc5e16a04911a4da21d972
SHA512b08fd2afca55bc476d86b701f0f32e574ace2e0312269308e32168f0190c892f91f59208d3c1fecc29991678743a406ea475c3074d06d651b578c5f142bdfe63
-
Filesize
2KB
MD5509f98eac3b534f914e7a51ac4333534
SHA1a9aa0245a0fcd76d56619ccc9c6caf87c7097c60
SHA256356df31c9a0996d0da1652a359a6d0128428b201c64cf900b235c337071e74e8
SHA51287925dbd78480eb5655c9ca3e8a9d7cbe8f0c3773c66c1d962680a7d3c14254a70fe5124c39848dccc85ec663b8f04167c10a37145803437bf13b42b0fad94f9
-
Filesize
2KB
MD5f9e54d7c671751f29a6c247cd7ca00cc
SHA1947be14bff750d5a935d11a302cfab5d5e95587e
SHA2562aa189f5de726a3d7d12bb8161b56e46cec87eb7030db16ea399da5d8e5afa74
SHA512987e2bef31881b0cebf60f818b1079e783e51fd547fd54b8d06a89894502d7ed9017d95a351f9eaf7bf73cae7272dd06d1d087dab53d0f1e51b25af1f7b41690
-
Filesize
5KB
MD541b28724dc792fa291c5c542f2b23448
SHA1fc9fbf9af666784ff21f0f8b19554f94b3c4f59d
SHA256b36b4ae46c40623d3ebfded097eb3857cf3ec514c06e43121716d9d73a717d8b
SHA512c2d76877272cf40c583e2f2330440018fc83f75aa8e83ad87573290c081178720badc6e9df1a94f4607ed51052794c2f94b27b0fd9977e66159c235a99bfb50a
-
Filesize
7KB
MD5d749a9c62f6081abd1957c87fa02ccf0
SHA13a7fc19dd2488fc0d5bacc5ed2fbeaeec8abbd51
SHA256dcf760178e9f1798b9b8aba4f08404f8bead574ff4dd8f93c9d24d38b3d83907
SHA512a8fbae571d5f4c1e57110f4300fb7276f50995ddab9b8e7d964e7c718cf8a3ed77d2a504c693c3e8ed3d79a8a1d70b09884c538949bf47bdcb2796a9c9586c82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b5d88f9c2b73aa8450f8ebe778db1d57
SHA1d23b823d650e4e3000be5fdbfe65b36b6abee449
SHA2561016100bf1e39e857a72f688572da0e299386b494c5498a51495fbbc543c7998
SHA5125ad44f5dbde47ce1746f382f399cdb18df544c7120d857f382d505f43384b3d6c7032469aaf3b8c221136c3141df94563978b7ddbd86f007ec6b7ff394431463