Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
79b95667e92f8464b540c766cc563519_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79b95667e92f8464b540c766cc563519_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79b95667e92f8464b540c766cc563519_JaffaCakes118.html
-
Size
62KB
-
MD5
79b95667e92f8464b540c766cc563519
-
SHA1
3675418ccbd948a24901995d47bb0f725410a0f1
-
SHA256
995a286d7bf8d7a52f22c5c1bea50d3a7518fe007188a32416cf15eb6381f08f
-
SHA512
219602151a70a79114dad421531631db1eaa079b6ecd40491eead39f2bc61ac81125cd5c88f21465974a90fc88c720a5e243c0a291faded7d8c31a7b7f435f1b
-
SSDEEP
1536:RYzzb03jkbPm1IcwCVsZPmKCFYyPmkCB66PmahTwwPmgYdNPmiwQjPmDCYS9Pmk9:az38FmOHB1Hukf15WMb85ze
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 1180 msedge.exe 1180 msedge.exe 2200 identity_helper.exe 2200 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3480 1180 msedge.exe 83 PID 1180 wrote to memory of 3480 1180 msedge.exe 83 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 1176 1180 msedge.exe 84 PID 1180 wrote to memory of 3756 1180 msedge.exe 85 PID 1180 wrote to memory of 3756 1180 msedge.exe 85 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86 PID 1180 wrote to memory of 1560 1180 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79b95667e92f8464b540c766cc563519_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99ca746f8,0x7ff99ca74708,0x7ff99ca747182⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,15110432231953391252,11038189512379500242,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
181B
MD59ec66a8281345ee3b5651903948f06f7
SHA17f2e8fbf739035569b4fb571ce8c84448d4bc061
SHA2566c43ea49a58794806b4cbd725caa17c4993ec410d6af58dad3423f1b4defc7b2
SHA5126332fdcdb77ffdaa80c46787717d4e59c1f44c5e9964fbc59cf96c5777e127733669bd341b0e010e6c2c7a1ef55f76a80240972f44e6691fa6c7ca6eeb6e6051
-
Filesize
5KB
MD5d5c6b07bfb0d11978431b96a669c3103
SHA1aedf40f1ae29decf620afc3d6f220e5196ada002
SHA256ca98e1a68ece06e8fc2561fd599a2d43537589d29065f022b38b944ab759a6a0
SHA512f658cebd8e2a6e01a2f944d57ddf63188e29190b267f9a08d8cc8d5bb7b006020562b0189c55f85c571c1b7d35d100a5898984d1ad3e64cf20dcd06915ecf5f1
-
Filesize
6KB
MD59210a02731f3a1e0fa254ef6e17501ec
SHA1b091776c5c3428cb7aa1643feed2a11f7efbaeb3
SHA256b5653165bdf547e52070940891cebf048cf960b1556ec9a7ef5fe5979640e7e7
SHA5128f096a072e910bc23dde65e88aa89d8a3100f0bde271e57adc585d4d268b724d009fda843ae4b17a0e09a03c63d36dbbce6cfdc7f68e9a08d29757dc6736b702
-
Filesize
6KB
MD55b21c11f24ae16339ca9cb8239857a9d
SHA1e09cd96fd56ff07b8230daaebddccdd54bc9ba17
SHA2568db1db8f6cfadf7e1f664a81a9af0fcd1960ff11b508ab538c6a21ca72a0bacf
SHA5125c06f60b5787fa9e95799ce8581aa23a331d6387404ab96161e289608a848de0c1cafd707c12ab188f4387338beee4908a719e8c23bac0796f13ca5a7ddcbc4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c7ba1ce4a02713544a5c9227e00612a
SHA1003123a5eebadc50a21e9e14ced0e0b10cbe17a4
SHA256f0b8a4885212b1ba909fa768d8969362af19dc13a5d64ff50de0dac038b5c6e0
SHA512f35ddaf99c2dd156d85f770fe24fee6b0d8059216af02744845e6680963ec9a7167c8272b7d07ed47f8341753cdaf9963f61eee87bc0e49e93ae949a56792e6c