Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
6572f43a8697ec967aac29e8f8972a52_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6572f43a8697ec967aac29e8f8972a52_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6572f43a8697ec967aac29e8f8972a52_JaffaCakes118.html
-
Size
448B
-
MD5
6572f43a8697ec967aac29e8f8972a52
-
SHA1
ba0f1d558615eed0e57a6e4de4048d54f317a21b
-
SHA256
e97dd5a0186573d51260b3b7950cf847f2250b02b87c573bc880d359ca1462cc
-
SHA512
bec1893657fbc1d99bb378b8aab50f3a64705239bc32283afd2149b763d145308b41834530379ea4dbee561cf0564370453558c519f1a5e5cf8e5950112bffb4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5788 msedge.exe 5788 msedge.exe 3500 msedge.exe 3500 msedge.exe 4228 identity_helper.exe 4228 identity_helper.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 1336 3500 msedge.exe 83 PID 3500 wrote to memory of 1336 3500 msedge.exe 83 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 2384 3500 msedge.exe 85 PID 3500 wrote to memory of 5788 3500 msedge.exe 86 PID 3500 wrote to memory of 5788 3500 msedge.exe 86 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87 PID 3500 wrote to memory of 1272 3500 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6572f43a8697ec967aac29e8f8972a52_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa12ce46f8,0x7ffa12ce4708,0x7ffa12ce47182⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12489996977871306623,9773615855538806530,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD53f292a98a4a4ba0c143d1bb626d2cbeb
SHA10f5907066b6ff746a92b5847e5a35f076e8fab67
SHA256beb0cb0cf6a5cadecfc99dfef8abf4a03240a8fc8e91d6bbf232510ffafdbb69
SHA512acf9719f5caf4903e25e3a542168cd7b9e8935af82892071065823185244e16ccf9e661a937ec5196009a0dfb96515d610b3051d38ae3d0f82f8e6e46717872a
-
Filesize
6KB
MD581264c7cf8f4f6791cd5d0becf8443f7
SHA147fd4ae5aa08dff4da9143268537b023ec134263
SHA256eed75f8678c40c2bc16cdd90db6be36c6f35f539a1522cf66bee9e7aaa62e7b9
SHA51260038ba5e3d91796b2e211e0cf89d76d1315f97c69d358088f57e6b503e25cc4e750ac5a159f780753c19dbeea48aab4e0e9f60e78f25710f03a7bc982c0008c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59c2c336e1949c37c9826a1aefa578853
SHA16b4af220321c9e26343f3fa631d69ee78f70ad02
SHA25672d47002d3057e3ef29d154a5816e61d24378d61d3bbd2129cacacd40fb0c9df
SHA512fd5254937b0224757fef34f27d016d77527264ad0119d0a7d168ac00126bb5aa584844038f1c5cfbff0bdd283e52d006bdd36fa3249dda94226bb3404566ab63