Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
661317b49c3511e018f054b107094681_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
661317b49c3511e018f054b107094681_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
661317b49c3511e018f054b107094681_JaffaCakes118.html
-
Size
39KB
-
MD5
661317b49c3511e018f054b107094681
-
SHA1
37dcf2897b61ed7be05319e3dd036906dda9caff
-
SHA256
c8af262d0cd345354430d09501ba283cf5a4028da598659b6ad3998b3f880e7a
-
SHA512
82d9e7a08b00685344e22df90cecfa56c0e0a0b5fbe493072ffe8f3d48f0de3a150769bf788107f13cd58e01b01e0ed660522c185b33376745b3fc919efe2889
-
SSDEEP
384:kYhJITEu11IwXk5Q1KCaGYNaNKJLH9QUOxIP/3RJw4O9eCLeo0kp7oPrtNfb764M:9hJITEvTO2ocXoLP7WmP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1116 msedge.exe 1116 msedge.exe 2928 identity_helper.exe 2928 identity_helper.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4436 1116 msedge.exe 82 PID 1116 wrote to memory of 4436 1116 msedge.exe 82 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 4424 1116 msedge.exe 83 PID 1116 wrote to memory of 1444 1116 msedge.exe 84 PID 1116 wrote to memory of 1444 1116 msedge.exe 84 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85 PID 1116 wrote to memory of 1928 1116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\661317b49c3511e018f054b107094681_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0a6a46f8,0x7fff0a6a4708,0x7fff0a6a47182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6284249852174935034,3697807208126996085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5d4c5824547b2d2ace87d56353faaa4ec
SHA1c4725a53a9a9ae0b932edf72c42c399ac8eb190a
SHA256679b57a36e3b2ab26a6c73bb12c9fcc23dd0368b62f1f36a9714e41fd8accac5
SHA512f1289d2d909324d00460e103426003f4cc9c5f2bb97399422b1625f2e718b3c1cdaa7a7709cedc6df181d807159caa4fad54abafa319ceb31984990ac593442d
-
Filesize
6KB
MD511997a2bbb5b6e530476c9d7bcd3cf91
SHA18d0cb2dcd5456a3f014f09bd307122b5e29776c1
SHA256bc131e9c5e7b3d0e211b15d269cf52008d05bf090dfc2d0b451a51622536844b
SHA512c054b85cb78dc97c0a60a145543bf871aea5a9b196256a1572fbcdcbc0d2f9ffd3fbd6787f0d31de20584016192533128fb6fc296eae6aae1e430eefea9012a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57d4b2589b8af3d9b5ef34a9593dc7d18
SHA16b4e7388f5b3ac11f6c815cc1211ada0285a4b2a
SHA256b82758c56821e2c5645a7dd837e17b4f8f6e569d7c040c9a2a0b72bfd2fcef5d
SHA512ac18c992b6f9bdfa31e9c0181def35d9c3914215aab918a3a2ab50646923ac091da827a5706f58bb173a2166d8e58b1e2ab4c4f3614980e4fbb3e1c7716dac0d