Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
50297dad5f8e665e06d560f233cf31c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50297dad5f8e665e06d560f233cf31c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
50297dad5f8e665e06d560f233cf31c0_JaffaCakes118.html
-
Size
51KB
-
MD5
50297dad5f8e665e06d560f233cf31c0
-
SHA1
916fd0a13690b70c719b884bf5036c3f571ee296
-
SHA256
b1b4a6f902d8a9a306c005f67b60de26cd936fe16c10379d02b5850f48a14b43
-
SHA512
184e813e8162054cd3abd39ce61ea37f3e6be2567de20998b20c3730692e91d20d9973f3e473afef86b86e67954ca2d9710f9319b025d1f255d86b85e2b11d8d
-
SSDEEP
768:ZkCeCeCeCeCeC7CgCgCgCgCgCgCmRgkJ3OnCeSs5qrLuyp:C77777cVVVVVVVRgkO5quyp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 212 msedge.exe 212 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 4928 212 msedge.exe 83 PID 212 wrote to memory of 4928 212 msedge.exe 83 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 4808 212 msedge.exe 84 PID 212 wrote to memory of 3068 212 msedge.exe 85 PID 212 wrote to memory of 3068 212 msedge.exe 85 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86 PID 212 wrote to memory of 3004 212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50297dad5f8e665e06d560f233cf31c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9499729082828803519,5488801781713379946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD54e55bb5565d2f9feed073038101a0707
SHA14cb381c0f506e154a52344085c06f916b62638b6
SHA256e2a713daeb86b2fd4853178687fd74dbc2e514e9c1fef4c916acac72b90f0173
SHA512a6316e21709d08d1d3e87a73e6e0c759cc92a5b341a75ac1a55b39c259d388b4997fa7ac3ccddded13d09886caa1c759f7a8d08004abe6964b49596b591e7f0d
-
Filesize
6KB
MD5e0c28077b37c88ac9ecd072519cb2a92
SHA170063b377f5a3ac2449a939ab569b7b9da579162
SHA256ce6af5a94878d444324caee479b7f3cb476e64f15c06d18ae1f8761e97728c9a
SHA512466af4597fcdbbbfdc1d6f6aa1f8210eca0d8c59a190831d1126143ebb3d72be4248b03472e917374b000a6db018162e7559ceb213cdb5fdc91e98e35ce0cbc4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d54de5bd96a738caed44b02ceb772ddc
SHA1167dbf84448ade64b1423b47bb9b3f1fe9ef179e
SHA25689d986281b4f13531519e67ea6e296fa64aeb4f955156ee95ec8a7908cf20e20
SHA512ce0e399d4fd493314e58bc07e688e1477af566236b71c5ae4e78762880d675efe521cfd09af2f70c3f9658865dedc78c043335af89306c777a598e750f052d89