Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
72fccd2539cc3342359f512bb0ecf47e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72fccd2539cc3342359f512bb0ecf47e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72fccd2539cc3342359f512bb0ecf47e_JaffaCakes118.html
-
Size
115KB
-
MD5
72fccd2539cc3342359f512bb0ecf47e
-
SHA1
40a13d53610d36600974f5245a9b4a2d903723a5
-
SHA256
7a5e7090bc884a14dc868e4975ca18d49a339652f6ad383e57cd7b3fa1552cbb
-
SHA512
4f0f424748a0d6df7928ff0266152b1d1f65e5a9854efc66ca4f91bc80fabdb207058e0b20ffc98ba727e001143367039bfc908c32912358b51dd6e5e2303ed4
-
SSDEEP
3072:S/Mnpgq5/mjUglyfkMY+BES09JXAnyrZalI+YQ:SysMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 1076 msedge.exe 1076 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2832 1076 msedge.exe 83 PID 1076 wrote to memory of 2832 1076 msedge.exe 83 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3084 1076 msedge.exe 84 PID 1076 wrote to memory of 3696 1076 msedge.exe 85 PID 1076 wrote to memory of 3696 1076 msedge.exe 85 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86 PID 1076 wrote to memory of 4972 1076 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72fccd2539cc3342359f512bb0ecf47e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1d546f8,0x7ffab1d54708,0x7ffab1d547182⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17509019772227640955,18376111572863607627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD56619b837217ba488c6fbd84ace370d2f
SHA185aea071454a17ae140ba736fd12bf2bae9a3fa3
SHA256c816d4e5fbf10e2c47eaaa43ba3a1954c6d0dbb27d5d3b19a66b14200b5a33b8
SHA512cdff5e3bd1320e128e71833370c0c643cadf46872cfc61606c53530df0642d880b7ab02236c96d200a288d4f3b5723916765524bba55139b1cc41621a28ac7b9
-
Filesize
6KB
MD5dde1b9700f0650a4036e56b3a22d821e
SHA11017cc6193a529356220e02c0a8d66ba7e3b3a6f
SHA25689181ff6fbef90eca57d9eea7e50bb49b3bf27afd1cf893b5251e5339050b033
SHA512b2313134cbd3e7f009801d0e231db78cede76a73ead9c564a9e9c9db3b937a98ba44c4f95ccf32667250c7dbf44cf20ccc7c26ba3383c0510221f228d4b2e670
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD539a88bbb6c0724a7642f24432baa0068
SHA1e1f1185094d74b6c409dd7c2f3cedc05c27d0bb2
SHA2562654790030232f65ea56a7f92e59a9614019d4055ce220e422f6188b67cf05c0
SHA5127141d709f7b4e43e7b73dfa20d08946181d75af0ccc9d66b16853ed368ab86ac2389e9c1dcd47106fd54f2356c7ba48f1b1adca168b2ea64e6802079fa56e6da