Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
3df7112fb248e2f0ccf0e1b304c49ec6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3df7112fb248e2f0ccf0e1b304c49ec6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3df7112fb248e2f0ccf0e1b304c49ec6_JaffaCakes118.html
-
Size
131KB
-
MD5
3df7112fb248e2f0ccf0e1b304c49ec6
-
SHA1
a1e1c44d2c60685d4bce6fb15b4dc27141f456d7
-
SHA256
cf3485daaf63f398b132143939d54c69b0b77a1a750cab91fefb55c1b255fdbe
-
SHA512
860f54a5af7e5c21c9d7ef0009048d7370a84e453768366a88abdf1e1b5f0a767933a55faa8598dbcbafae8c340d3e2534904500979467cc6d6844085e8cb947
-
SSDEEP
3072:K4yGVeYT7g9qS1hw6kl36c+dZ11W/o9wvedI:3yGVeYT7gmV+K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 3916 msedge.exe 3916 msedge.exe 2020 identity_helper.exe 2020 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3464 3916 msedge.exe 82 PID 3916 wrote to memory of 3464 3916 msedge.exe 82 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 1428 3916 msedge.exe 83 PID 3916 wrote to memory of 2512 3916 msedge.exe 84 PID 3916 wrote to memory of 2512 3916 msedge.exe 84 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85 PID 3916 wrote to memory of 3228 3916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3df7112fb248e2f0ccf0e1b304c49ec6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfeb46f8,0x7ffccfeb4708,0x7ffccfeb47182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7502431640817109309,12575698036687491133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
1KB
MD57e54243ca7b180955a8664764c84b3f7
SHA138a8a8ce56e4942ee37ed8bdaaaa412333b691b9
SHA25669a1f6077c57b8ccc6a6099d480f3740c1634d9d7ed12dd004caae3a1e3d8b45
SHA512ea30c8dc7d2286999917f196e3fffa3aec25e7f43552c54b8bf100c8152013debe0b152c13660988b91f2bb475072c8299df1ccdc077ba1074c3b449f87e2b09
-
Filesize
5KB
MD5e8f94e1e5eef97a94acfcb4ba14163d4
SHA16a754f74471490a618567653e91e75b4c1d3a324
SHA2569a83e6d9b9951ae70ac9985c487d6171005586cb23cd5544af300c3a64fa40b2
SHA512ba8f53793dc315aa4ecb2e6065026deac9f58ad0f5abd5f2ae3c372d4a624731a2df0fd341546a3cbc733af2344364909f226bd809ff007e05b3e7d47e9ae65d
-
Filesize
6KB
MD5cbc6fd2e48dcd4a188bab2cee491bd23
SHA19ea45ac9c7e1030149765455426b25717f29ba22
SHA256b5161b2195963739e4c1fd672fb39d547ea5d6b430195a2efef2c9493435e8e2
SHA512fbf1bdd7b00dd232fb293fb28762ed8054ad1c4c91258ca9b4ea04d093892e2b3a63ef26bc569dbdc231fc32b5b32bcd5de913888a122a0a983d161b7c162a46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58732dd1f49e8309e297bef25b8eba93c
SHA1338a72d1a11943b8179541323638d7b7f6ec6c73
SHA256560d77cef0fae1f610a05f375a5296a33c914971895c8329f64ce9c7a804ef61
SHA512026beedd7a744317ff2b559b81cac6c636d9a3ac362149217cf816b3276a8bb7e658f5acf43f1326688df428b6ed76ec826ab4904e326370cd53827d8e1f8ee0