Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
5e232a98bd681c6c4617d6403fbeac15_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5e232a98bd681c6c4617d6403fbeac15_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e232a98bd681c6c4617d6403fbeac15_JaffaCakes118.html
-
Size
904KB
-
MD5
5e232a98bd681c6c4617d6403fbeac15
-
SHA1
a2c98c800c24561cb07b6ef1409299bb9f70ba68
-
SHA256
7c43096225138bd2a38cee3ea18c601e4b9dcbb893a10c21a0ba9097e2acf4cc
-
SHA512
8c7b07daf34c058039919710d71409d16224380388f1fd52411571ada125614a7df998154d8e5476c5b1543fe0823b1fa1b02ee0f124766c80bd6ec5499bc6d0
-
SSDEEP
3072:/pH3eszA0N/Gd7ZXtjgrJtdYIVeef0xOMQfw/K3eszA0N/Gd7ZXtjgrJtdYIVeeo:4sM2tdYIYQMRsM2tdYIYQMpD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 1880 msedge.exe 1880 msedge.exe 2972 identity_helper.exe 2972 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1348 1880 msedge.exe 83 PID 1880 wrote to memory of 1348 1880 msedge.exe 83 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 6120 1880 msedge.exe 84 PID 1880 wrote to memory of 4716 1880 msedge.exe 85 PID 1880 wrote to memory of 4716 1880 msedge.exe 85 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86 PID 1880 wrote to memory of 3824 1880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e232a98bd681c6c4617d6403fbeac15_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a4f946f8,0x7ff9a4f94708,0x7ff9a4f947182⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15714307874140897246,3527825652720300229,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
512B
MD501c01df30c6bc57dedbf077df0b0ed76
SHA1a35e69f4234b9b1b64a33746569e7ef9b181881a
SHA2568df535c8c9107972e024b4216e47fe77f7362d73a97bc26980b74110fe8f2628
SHA512fa2ada796bdd34526228b00554954d340e04381228d3cd8db506f81f09a95f6c84cbef4ced59b7ebfe7bca9f71e5c452bdc4405f791bfb12b6532ac990874562
-
Filesize
5KB
MD540292508b400f82aa7b5b3008d0b5ad7
SHA1292a91dbf33e9880ffb028c78e3a310482b5dd78
SHA256d8ed53d40852895f77acd5ad37f122b47eecb8b53bf1b370047b8020edd85d76
SHA512336a0f17b5ac3ffbf7948a16fc86cec411edcf5c5eeb8a2f82d3e5e54772f44f329efb89c9f0d10f8d30eef868a0fbbd1f45287fbac07fa737b32bd16483721e
-
Filesize
6KB
MD502e83f97e5946b4b08d4df60c56874bf
SHA1aa9615a992a9c14c33006ac1a618fa958817d0c9
SHA256a70ebac711662c003e7d967351885bc244be906e0866d3aa71d134585a2c7597
SHA512bf144482f3f20cab8f6fbed9e6e3cb5f711ba91c71de738f274cf0bec2ad9b6da545373c03f56f8f5943071e86b55b0d47803fc4887f40ccd59553f0c1a109b6
-
Filesize
6KB
MD5817dc74da87e1e2e5bec8536a0a56f9e
SHA154dde62f680064f942598e7cf68b190185a85ff9
SHA25686afb7c1ad92af0f2da6423975a10e69d3dccafdbe3d6aa9222cdfa57da15f28
SHA5128bf6636b5a41144f9f5276abf5a70d550ab378d39b5175659bc681af0a8c79c83e30e88d47c82ce7023f1868ce8231bf15a693f6d0c4a17e045629b38fe5e9fe
-
Filesize
371B
MD50c2f8b5116769a5b28be5b5cf7750d34
SHA1d4cd74130e75bef9067f6fa9fef9f10602deb197
SHA256dcaa3158620989fbd0a900428f2d221c6adcd4df938d2c0a37f8ab0b11b8b60f
SHA512539512288f2ca59cff42b5a6b60fb4abb471f9195f3d87803a9740b8b292c48e9fcd362fa5ba8dceddb87ac94ec520982c2a150a37eeb829bf0de51aa32d25bd
-
Filesize
204B
MD5819adea9488991c54c2319f549310b3f
SHA19d5eeff1a16c9371045e64ab56a4ab24df4b617d
SHA256ad4ac534cde06ee60b7d709632050ab7127438c7de48fe23a083c1da218549fc
SHA51200e56fc27db7afa27e260236da382524bf6e9cb6bb384bf2ef188c7e69ea2aa2d60d0f1708e3efe3be1ec4cbaa8bf6eb2831bab7c53f0850c4291e3f384f8b41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52c19f5ad9ab73d7bb89e98a92537efb0
SHA1ef6f18e85b7ff2c3b0aa8009c2391eab1bde840a
SHA256045625f80f8adbc1c911180113c074ff43560cb775a676e9d530e54de1ea84f3
SHA512c12d49fd0769a14a561e9240bcc98b1238983887c673cc8c9f9902628a20b9957072dd850c42e3ed6a8821cb5383ae29ec9acd51d6f30b921d3b8dd496b49d73