Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
40f05d0379878886574bd9667fc74fe0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
40f05d0379878886574bd9667fc74fe0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40f05d0379878886574bd9667fc74fe0_JaffaCakes118.html
-
Size
37KB
-
MD5
40f05d0379878886574bd9667fc74fe0
-
SHA1
d8ba475c624cc65f2b14030df990d63aa103700a
-
SHA256
07f90b8305f8bc99b5c1907df54fec74ded324ec124e5df20bc325949629cb1e
-
SHA512
109c250d08830888d87801871b5a8ea87ac62b90d8cb82b56786e9d19adfd5e953e2c95979dde7bec98172156fac44d29038d557672bbf38b114b30eef8f7260
-
SSDEEP
768:YNxsNXOcFgxpuq2XH0sbhpuaGxt1FHUoDsFaW8vVflHJKT3xKiifF2kcT2lg4CIL:YNxsNRFgxpuq2XUsbhpuaGEoDyadvLH5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 1020 msedge.exe 1020 msedge.exe 4268 identity_helper.exe 4268 identity_helper.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 936 1020 msedge.exe 83 PID 1020 wrote to memory of 936 1020 msedge.exe 83 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3008 1020 msedge.exe 84 PID 1020 wrote to memory of 3300 1020 msedge.exe 85 PID 1020 wrote to memory of 3300 1020 msedge.exe 85 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86 PID 1020 wrote to memory of 4024 1020 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40f05d0379878886574bd9667fc74fe0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f78446f8,0x7ff8f7844708,0x7ff8f78447182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14510662821503403195,4824325014052417849,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
505B
MD53818252997e2d0df8d8887957b679eef
SHA1eca37ad0b4341afcbf6a8f4d3fe7a91f98be8e14
SHA2560982cbecb14e752f32a042369dc29d4d7a11e83b2e75292368b882ffdbf8d603
SHA5127157a0fb1147c883ccfeb0a0b816f73ef7321d2471c3d58fac1b6ccec03d5a2939abb23bc41c0c31e628c2da8869802fcd6bcbc814f3e223fbe30790eaeefe91
-
Filesize
5KB
MD53555fb7cdaae309113d7f4c4de2a438f
SHA10142ccaccbc4647748b394cfd43af439d36d4d28
SHA25654afa6da8f85b7593da45913645607ecee3fa7e3cc97321a0ff116a2169629ad
SHA512526e9dd1aac262a802777ca8266159fc8d693ed1f4357ab06a517cd7c538e05a663edbc9c3aec74f56237e53aaf8e7b83dfc78f3d4210f2380b0d98595f0a756
-
Filesize
6KB
MD58abddc11a4c84fe296ba74ea53738911
SHA19f8aac244de797c8965522cb5cc170546abee1bb
SHA2563e18b0791f9139b36b851a89142933955e8860b512d79887d823ce909a291085
SHA512b5a8e1f7c488d1e0d55ddb872bca9e09d8d47f4b8391cd71cd9ae80aca82b502b048b9928e9321d76457a718bda36a03c7341906d9d305c282e956e815a7d366
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5afec951c8d2538ec25ce15d52ea19a0b
SHA1e941d797b331d426ab604d6d39c6c3d4479754c8
SHA25692709a53651e0df1042d8015bcae409e39de31ded1d0c25a897e26c28c3ac4d7
SHA512749ad0361a13efe3f2bba6674ef695d63242858b0ae6f3190955f1a322cb0483bb0c407a5f49b81dcc13d84349e833fe6d94d7725ad0754c46de7663df8288e3