Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
3dffa618c15d50210f6373db11aa6202_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3dffa618c15d50210f6373db11aa6202_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3dffa618c15d50210f6373db11aa6202_JaffaCakes118.html
-
Size
173KB
-
MD5
3dffa618c15d50210f6373db11aa6202
-
SHA1
3586a3460768631a2aea2a84b7d48d7c424bfb1e
-
SHA256
5f097695523d2362c62957c1a8376acbcabcd133f3dc96fc17275e9cb1bdf426
-
SHA512
36bf23916f26f0e50af7a8603cf7dfd429ffa85161de6c94397bea20140da1fd3ef409a1c2f58478c81841af0227bc26c8a7946993f4afe7676431e6c56c4fac
-
SSDEEP
3072:ZRcVhIVs2LQegU0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRS/qGlVPKA4KiZzaP:7cjJ/jXmNRJA4jAUjmtkRkR80
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 4764 msedge.exe 4764 msedge.exe 4224 identity_helper.exe 4224 identity_helper.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 216 4764 msedge.exe 83 PID 4764 wrote to memory of 216 4764 msedge.exe 83 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 4100 4764 msedge.exe 84 PID 4764 wrote to memory of 1020 4764 msedge.exe 85 PID 4764 wrote to memory of 1020 4764 msedge.exe 85 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86 PID 4764 wrote to memory of 1752 4764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3dffa618c15d50210f6373db11aa6202_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0x100,0x104,0xd8,0x108,0x7ffd077646f8,0x7ffd07764708,0x7ffd077647182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2366891803846533720,2174025668861274655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
1KB
MD553e3589e848a40154a4d62cf1c679265
SHA1fc55576d9a91817d66b59716d8fc0caf023fd38f
SHA2567884251ce83207d00243a92eaae6e16c47001965a701627244504bdae4e4a45b
SHA51211c0e7d1adef6fbf5de52ea3a440939f13bf6d3f2465cd63bb360f75e4a86ac316b3bd8240c0b23b9d936e58c9d2407757da0c30f7661d572a5219ab03b22a23
-
Filesize
5KB
MD554292f766e0221a752de30b457c8d76b
SHA151122ef7687de44743c8e85e1674b18bf2f0d4d6
SHA256ee1458dd0517a015bfdfb07c528b972dcbf2945186778d02246ab6b45dce153c
SHA512b7b32621283b4cad1563f570e5d44e217b4d58450f44bfe6dda1350fd1fc5e6eba130756ac296664033fc40cc6499141c12ee945826295a0036432dfb5b75841
-
Filesize
6KB
MD5ef8396a59d7db86c62c11dfa3994c560
SHA10a9710b42c56c80d6ec2aa9af5095dd566b1c87a
SHA256d2cb056385064a190311048b8cc49ef73823d48c327e8eedf84d23655ee5b7e3
SHA51278fd407c87ae98aec7c1d09a1e7cc3024e811ec453dae0441c6f372c987cfb792b9b9003a8caa75c6ecf37eb2a5953733233cf5328704da19bd7ae9bafa1a9ea
-
Filesize
7KB
MD580106d4feb1c8d6c02f1a604b9e66e37
SHA1b41ca89691e460c10bc68882694a558ff5c56605
SHA256efc6008d09aad039088bf33f1e73fb15ce7410287ce883b9ea14e5ecb5636dbc
SHA512c2b87bfed15dbea18162bbca8b83bbca72e5cd88cb457ec984f820eed395faf12a98425c33cb7a2e14ba4a14338f4222a8d57d6a8c8068d78cf5844e80be4c94
-
Filesize
539B
MD56798a147e0302a31195b1e80ec2e2c6e
SHA1517c737f7981645091116c8baa29a36dfce3529c
SHA256e31275901f74ab78996939e46bf630dc3639977a066da92a44950564ecf5f839
SHA512c48ffb3a96dda9ffe628a1280486ef4f03b9367633bbf1bb9b8190b222f14e3c2123a569a15c9c08decb3fa7f9ec20745163fbd3c899bbd1cdda1d419e0acf20
-
Filesize
539B
MD512e4f2bbfe3ec6bf6988144c2cea813b
SHA1f9b42a3c044ed57dee6ef8042e8580ea23c0145b
SHA256c9b0f7510e60a6db8968848bbbe82da7a6f7bf85b5dbd3bd2e053f31df86337e
SHA5128b255cd9a1f13d06edc38ba7f6ed9e0b2e6ce406e415259a9ac35082fedfb1ada263bcea479cee139c89bc705a21d76a22a1931ea208b0090234f95a124bc672
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c78c23338890942191ae5cb5c1235ddc
SHA1b79b3cd167942421782fdfd97eabebe27dadb1bf
SHA25636b1e59ab103687cca5834b3a55889a56b3576f615d4bbbc58a0d87e2b0a43e7
SHA512dfbcdee245757efbb5d5d137aab33a2b051818bea2d6780f9e7d36e9b69900504093b03c87181f124a1c4b6a51623b2ecb22bba4be3c9426caf03b378a574563