Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
-
Size
4KB
-
MD5
740e0c7fe58453fdf5d5ad2b0c962fcf
-
SHA1
0ef1de9bcdbd2a2e47fdeaba9412f4dbebd4eb20
-
SHA256
52c27951e5d3604c3eeb42d56c606a734eb75b3e828eb5c3c9c9c2adc5628a51
-
SHA512
7f7ccb1b9e03d9ddbcf31b5be957789ba3ccfe49466e824dd4e459b6244b30f558b71186a0497ee648b1e04765401253d0567e85f58c1c1292d414e65cb44326
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oM2BqBd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 1336 msedge.exe 1336 msedge.exe 4168 identity_helper.exe 4168 identity_helper.exe 5748 msedge.exe 5748 msedge.exe 5748 msedge.exe 5748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 436 1336 msedge.exe 84 PID 1336 wrote to memory of 436 1336 msedge.exe 84 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 3712 1336 msedge.exe 85 PID 1336 wrote to memory of 2736 1336 msedge.exe 86 PID 1336 wrote to memory of 2736 1336 msedge.exe 86 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87 PID 1336 wrote to memory of 960 1336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2848 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15677813397348608115,14119365735509219828,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
292B
MD528d841f3ec9b649656d9bb42dcbf41a5
SHA1941e178da524127d595cafde3f3f282584c4f0ad
SHA256bd7a6e39333c9a58a95b425eb203025aa9d3eea0211a00224b33d8464feac20b
SHA512f37210a2be69927b01721f318e056ed3c2846ae407fcb5d0109a3ed8eee67c1336e3dff5e04bd1415c62f5237044fb8ba39ef7e4450021923f8a9c00a75cd611
-
Filesize
5KB
MD575c49f7a05c049f54cd7f2b78aabf31f
SHA1ffdcaf6ad709bd2156bf44ded65d57da03222402
SHA256d9a979097f092d86ba27cd7a4b2ec8620f845bc753fcb136eef3e277877ea133
SHA5124eac7f804f442b69199a1954b27ca6e073690bde34cd3030da75681b71bc33131e554f5382818bc191689bc3ac42ed2a345ba8987c35b71ce91f3713e7694265
-
Filesize
6KB
MD5c52d987e23427d2cf505750eba516e74
SHA1f78045805975348a38f41f3d28f9cadc3e91b6bb
SHA2562d5a5e753cf5fc26a22aa0477ca06692e2dc564126497019bc59e294feb7fac4
SHA512f3f35007d1b986b16d64608e36c9e5b6944b1a344b306661269a7d9e96fe4295d67c036546d7b4a95ce5d262fd11e4e54f5b78dc69e8be7dfd441955a478a579
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD534f253010dddc869557cf706fdceb323
SHA19133fd4f69ba426ce5770a0b2406211addf5a98d
SHA25608ea59647b7cd9e92dce36328023204b3a5941074c94cef1bdb9304bc8bcd162
SHA512444c15e099a15c4310168da147071e5af72df8c3ea7254da21cdb2e51a6e9c298d1287955e46d379c9a45b53cac1eccc59c1219b8647f783059bc6f528501ed7