Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
4c80971efc03b224d28a673ae941cb57_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c80971efc03b224d28a673ae941cb57_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c80971efc03b224d28a673ae941cb57_JaffaCakes118.html
-
Size
11KB
-
MD5
4c80971efc03b224d28a673ae941cb57
-
SHA1
19f0663922a9c5c097f185690586c3b320b86047
-
SHA256
837f7fd4156064fc7779ca0ced5bf9ece7ec0e5973f13c3f29d532ad44c89124
-
SHA512
0d522620ecbc374b01d4faee282ca9e46041768c27e967293fbae99851acc32d4c0ec08037c4273bdffa5f5a66323cdfaa0612ab937fdc584b01496061e399a2
-
SSDEEP
192:f1RVUVq6iikJrxvuiDOflWRleGWR/DceRbjmAA3crLUmN4tv8GSD8BpBrpVvoz1+:f1RVUVq6iTxvuiqf4RleGW9fjM3SLQtV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 1988 msedge.exe 1988 msedge.exe 976 identity_helper.exe 976 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2540 1988 msedge.exe 83 PID 1988 wrote to memory of 2540 1988 msedge.exe 83 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 2608 1988 msedge.exe 84 PID 1988 wrote to memory of 3052 1988 msedge.exe 85 PID 1988 wrote to memory of 3052 1988 msedge.exe 85 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86 PID 1988 wrote to memory of 2780 1988 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c80971efc03b224d28a673ae941cb57_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff631e46f8,0x7fff631e4708,0x7fff631e47182⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15617275549991784860,8359937957303401616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
256B
MD502c8ffeab71998d11066f83d8607e0fe
SHA1a09b81a4b02a5976b2ddcc341715262a5d1fff47
SHA256e39a3c1937c5b196c861a02a9a3ae35d54c9aec8d7536c03ffadee3557fec25b
SHA512aac7470085e3da75d84f33aac7165bd46215b7b99896b7189da35d64eedee738ec11b59a935dabee8d80ae19282cc873a0b636f71b5f877a89039932a641485e
-
Filesize
5KB
MD59895ac79972c548926f31ebb71cedaaf
SHA181cbcdea1fc1f030d0abb3401012f97019322e93
SHA2567d431adb5132e16813ee4b8b6d6bccb6e36fab597512e72c05b32cd5c055cb93
SHA512d4109c00316ba2c2b4cd5ace3f5136853a87303a06525ae74ff0f88a2cbfbd53fde66d89894beab135047ba1cb545a9e677f21c3ce47598c6c1d933d6a7600e7
-
Filesize
6KB
MD571989caa0ec91cf612c81e7bbcad7998
SHA1c6d53062f799d396385a370eeff68e9e36825dc4
SHA256767efa2c4c7a53b385dc0e361eaedd1f971faf8b2e7fe8ead12aadea8babf6c4
SHA512c980d73d1993e960e9ee3aa8eaf74fa5dcb348fad82fdfa4c8ce79a39961118eade7177dce058409b0bba78ef0674041e79829662dc62c5571862025bbf6c908
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53f2df8c6a0afa7d58f81e6b2e438ea2b
SHA16ebe771f8711c36253be2df2e78918c774183ac5
SHA25623e928554f02f554e1a6f34e139b9f3f24f73266fef8bd182a067d0ab3ae4372
SHA512fe0ec4ce0f9438cdb2b6206d9d1297a0d9e115faf76e4c81869224b1a7eb81956995b8d2f3e4c43eab130118724b1c0719b34c4bc102113abb35f98c6aa7cc0c