Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
6b50ca1448e323649297fd05204e1983_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b50ca1448e323649297fd05204e1983_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b50ca1448e323649297fd05204e1983_JaffaCakes118.html
-
Size
56KB
-
MD5
6b50ca1448e323649297fd05204e1983
-
SHA1
e191b08164f7a9df367ce55c7726c235d697cc7c
-
SHA256
084e84593c4032726b456834c6deabe844e9c8190a839dd1ed974aed464b9c47
-
SHA512
8c640192913bd27cc2b0b4075c89344acc191f71ce137389834ff221c5eec1931ce22fd4470deb1774071d4217e9e07bbabf7b8e82e08d8331af09180c568ab7
-
SSDEEP
1536:I2GnAIhVB02GLIO7shn+AVWJF0XQnLZXeU:shVBqj7shn+AVWJF0XQnLN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 628 msedge.exe 628 msedge.exe 3724 msedge.exe 3724 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 5004 3724 msedge.exe 83 PID 3724 wrote to memory of 5004 3724 msedge.exe 83 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 4680 3724 msedge.exe 84 PID 3724 wrote to memory of 628 3724 msedge.exe 85 PID 3724 wrote to memory of 628 3724 msedge.exe 85 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86 PID 3724 wrote to memory of 4896 3724 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6b50ca1448e323649297fd05204e1983_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,13429734333518965655,3850185206001819142,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
249B
MD5233822a5b031e50ef4c7f55efb814ba6
SHA1fd0162101a0517189e3a7ceead554083899cb66d
SHA2565a57bb662892b48cc158879eb38074c123a0b31df546d36b3d4f8efc1d1d952b
SHA512bd53473042512d2ee748723b14f00fef75502309145354fa106f87d46cc960ae9d37704e5a3f527f969d86b82022067e005efbb1b3818e12ee77bf1078344431
-
Filesize
5KB
MD5b22940f0f8640fba1b288100d224566e
SHA11c6211eb9ef2c3fb4e21942456ee15fb357f600e
SHA2560d6804fd078ce583c124ef454eeffe8dfefbbd118b73a9043ded16986c96297a
SHA512bdab74050abc2f2c7005190d43de78e378662e9bdbdffd69cd2c16e8bf4e7623014178400acb0fa73888fb15c3b4ae8640509cdea0d6b3849704f10ea2eaf0e2
-
Filesize
6KB
MD5f89536251994cfe75eeed95440523bef
SHA170a6d45c3b25cb52120a396ced970edea38eb889
SHA25639428053853fc3f32075362f8358af970dcd7a67d01d92c9cbf12336cb158aff
SHA51222f85a99ee8fa7ab035ed5540471a34f456df8886dc4f0bd33f28d3e00add0b16f77f0a9abce012af06260f93ea0343b421cd10c967a21ccd283cb34b1f139d6
-
Filesize
372B
MD5ee3bce60000ed28f349b20e7e03ad980
SHA148db615f03313f2d55571e32353f9f5a258e6019
SHA256c05a9548ac3d200b10617c5c42639980e5afc5ff9831439cb3ba8d48ed29bc93
SHA512450036c47ff98bd346bbf2675373547b9f09efcb8a29651235b61beb4c8801928033531a90bdb2a4e77ca0346d25c163e31a5e0c2bd2949b38725aff849cc94d
-
Filesize
372B
MD5ee8d9ab6aa597d1f27ab3da1778072ef
SHA19c3c7ca9d7df9c4d4c0c1aa075a50ea840ce2a15
SHA256ba68af3ae08c533c3549f8a05b17c66cc5011290001d99d7008a988397e3ef20
SHA512dda8bf51ba55431aa33a056cf441fedf2caf0ce04d7345c8c32db26f838bb6e15d6e96f5ae4c0ca0997d4587fc4a9543312521ff5fddeca817186115dfeff0cb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD565564aea77b14f2d393b7639e7684a82
SHA1dafdf6d425bba1940c9520ec428a81348529967b
SHA256182eb1ef593b2a6834b453ea3d1d2ac945c2e62e16b157dff08bfe544ed4fa81
SHA512b17dedede76eeb6fccc56bca9dd4d4eebf9d3e8195b6ff9600219af6d17e49a2c1b0f020adde4a684ca4817852aab0629d9817ced68a7705180b0ca962b2c7d7