Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
72811dd19857f7a5c9d23bb98e8a88f9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72811dd19857f7a5c9d23bb98e8a88f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72811dd19857f7a5c9d23bb98e8a88f9_JaffaCakes118.html
-
Size
204KB
-
MD5
72811dd19857f7a5c9d23bb98e8a88f9
-
SHA1
7f878381af4ab4d96319fdb707d41f5261fd7b6e
-
SHA256
0bfdbbec83a5985973628b3ee143df36a38166319ffe04215be620883eaf3bbf
-
SHA512
386c87132a1c7469940d6e266a431812165c1cdbbf5e4d6c33244a7486b005f9927e76eee8ade781d969f704f8928c13061707187e33040d4f2e498972134dcf
-
SSDEEP
3072:eVapmymeWWBBypvzeeGPr+gGmxnYppRyR8meKEBK1:RmyPWWBBypynARyR8E1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 4520 msedge.exe 4520 msedge.exe 936 identity_helper.exe 936 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 5076 4520 msedge.exe 83 PID 4520 wrote to memory of 5076 4520 msedge.exe 83 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1624 4520 msedge.exe 84 PID 4520 wrote to memory of 1208 4520 msedge.exe 85 PID 4520 wrote to memory of 1208 4520 msedge.exe 85 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86 PID 4520 wrote to memory of 3140 4520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72811dd19857f7a5c9d23bb98e8a88f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb633a46f8,0x7ffb633a4708,0x7ffb633a47182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16004796203882861866,3383727000564567181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD57b6838372ad677629d61fcc5e1b34a71
SHA12234ff94c5ca128b037a800a357a69fb6f4e16e8
SHA25610c46051e6f07e9565119d3a58b8ded3af04bb4f78dae1adad36085af4a02f06
SHA51297f131c3d4e5e09c18c5ea311aaa75240c83ce9b8610f6ec26fb7e90901c9b9615788f6578cdd6b3a2f339fa980f9ff713578e1a483f6be128f3d6aeebeb84bd
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
1KB
MD5740056a76f3f15f3789608fff9cb5744
SHA1e8f7419d48268974548a7b55845c1b95f8c17253
SHA256a9c9547696c0fd47c8caf450f2d9e6adfcabb64e7847b647ed57e05f2daa0ca4
SHA5128153c5d4614a56084ec010e0a748b62567326318f35922a421183f289caf55c0d48abb13bb09b18880758da184dae9c2d10a13c0ae0168cfe78acf624dc2312d
-
Filesize
5KB
MD5f609cf8429d0c41edb67a6c7e8c84a3b
SHA145abef3dcf9bf856bf9380bd6dba3498f0b249af
SHA2564c4a98a6ff56d3c790df80100835668f42f33469767d30b0726ce4fc046c5cdc
SHA5128228fd2b05218c9770af05157cf21ab08212e5f8f6caeef8089db294e1ee4ddca89b695c60fe8f199db633aa0f34e3bdda4f95af87dfabb3e760e2f183156b75
-
Filesize
6KB
MD592ea888433ea99b9587a27a756d673be
SHA1f2a951e0adce7954a973d044159bae3ed153f26d
SHA256a19e8013fad0da9c74505f7b89d91a99b426349b0d5b55745df977f1e3b2a1e4
SHA51225f697d714ea1a50729d93055b94a8ddab41ef29dbc34e511d742c2af834cfed4332b4d2e7cea60db12e9fe1826c00235ea4678809b0cceaca3e96fa4b638576
-
Filesize
531B
MD50eb799a06ecf86fc3d208ec97e860882
SHA1092d9e135fcdad5508a0874e150e0940b8bf0b55
SHA25657622c1f4fb6c04bda7876b72212fff1dbb042b15e41ae5da58562a8327eee43
SHA512d49fa4b0e1ce252599c7421ac4dfbef4caf6cb7bce65d4bccfd81171c2fcee9d5944456de106457e9f905bbc6e0e571d82b591d2e355116b10a528884b6a72e9
-
Filesize
366B
MD55dbf05035d71aa7aa13192763d9dc24b
SHA1655b5986f75da96de95c94076f0fba373c89189c
SHA256f753da1e177953f942d2c479277e99fd4a082ed437528a2ab0ed085eaba787ed
SHA51299fbc7c4c595703ca41c9525d6ddcdd6ea3e34c2e8f6288537db8b96bf547f4d5a617045e541104b79ade80556aa784a689d4f84106495eb8748426b29386803
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552a407965d4d53831625bb840b9adc91
SHA1abe4784eb35e7cf78ab44fa2d862dbdd624ecd36
SHA25694543850acbf3e32be259066a1732ca10d9e170c13121a3d8a415b47e8768adf
SHA51210fa4eb92ef18b205396414948460c1325599b015d1f1750096129b612f391f3354408d7dced3c691e2bc160fbe7cdeb35d4fa14030de136f895a4552655c957