Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html
-
Size
65KB
-
MD5
7d03f9ee71a3cd47e5732b0da3e8fab7
-
SHA1
bcf08dc3789b4fe0006ac427fefcdb1a8426baa5
-
SHA256
67a862c9798e8d93bf85143a9777fc08cc6f26202e8f87995d6b99451863e1e3
-
SHA512
5182ead6df216c9eaffc692bcfb51d02b01088319c86d818f075dffe2b0e410aacefddd1087bf1bc6598080024db6290bc7eadc589ce287aded7c6be6c50834c
-
SSDEEP
1536:Ct97RycyPK++xd7NA4KkOSaemAEL0jqck0b:Ct97RycyPKHkSaemAjjqcko
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 4768 msedge.exe 4768 msedge.exe 3300 identity_helper.exe 3300 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3304 4768 msedge.exe 81 PID 4768 wrote to memory of 3304 4768 msedge.exe 81 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 1344 4768 msedge.exe 82 PID 4768 wrote to memory of 5040 4768 msedge.exe 83 PID 4768 wrote to memory of 5040 4768 msedge.exe 83 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84 PID 4768 wrote to memory of 3328 4768 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d03f9ee71a3cd47e5732b0da3e8fab7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,2071230363763316822,11600825336649609588,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
475B
MD55112f748db64daa9d61ad880445826d8
SHA1e77d97c5611b7f8247fd216054852b1631bf9689
SHA256b396d93f6ab1b11a21cc904de41bbbfbadb396f0fbabb4e6cdaf6532ec67acf0
SHA512a353f2c15c8299abedb247d651f3bf53b46ce0a4fe5c503a59a3f63f438654a7c7ecbbd3005eaf3024721616d3f4f92e71ff4aa291b7c1dde7ea05b573147935
-
Filesize
5KB
MD5097597a587542374586784e97d46553d
SHA1c80c196f6385ab6576fad30458942006a0e80bf2
SHA256ab0e16d79d68c79697b53c8677fbb5fd603bb7983c93695a338117e33051f2d9
SHA512ca021306e083dd0008033f9137288bf9a7b4fbdc2bdfc01817c2e82b7c1b32d5fccad47251378f43a77ad76f6e34af4eefbfa7fe7b3d988ec1af88e7a16e1d6c
-
Filesize
6KB
MD515d5ed7beff23c1398bd68216a1025f1
SHA1484505cfb31f10e9c02eda6ddf73b7f454bdc05e
SHA2569c3b900453c31c3a83c4f2578d517f7c5abc30db8ebd7dd09b5de871ff03409d
SHA512efc0b179e3b0a318462de3339ff2bbe05086d384f4f3132cc243d5d64d3f3cd708f4bee538281d3d8892c39ba487e6f8ec1791ada38862a5998707638d8874c9
-
Filesize
6KB
MD5c3226790e1abb51b1f45dce53d836df2
SHA1b85841aa0e3e5c007af3707c6fe74d9e10c12bdb
SHA2568c4ab15324ab85abf0b15e34e7ad26c0f0452a6df272a207bf3cc0c720da4a51
SHA5129ac5d30125baab62b6b28500a49093d8b867c4db72a40b88b08408d7de463c9490e2645e97b804d01056002158159a5241f5b977137e7852d404f95d474aa961
-
Filesize
371B
MD5502038c240e979f261a5519aad683a3f
SHA115c90c50c7a1af115957be6279f4a14503074b7c
SHA256796727eae55b78ddf098dda24a0e15c0379cbfd4662541355422475f97772ae1
SHA512d0fc91bec3ffb011ab03424b805be30a9e5a94e9adb58bbd3726e46fe6d65fca83a5e620fd686c1233b31602d17bb13890d583e8a756a1ed497fab78672ba52b
-
Filesize
371B
MD56264342e8b9c562e7f077cddcd3e1eec
SHA12ca5d9c573e2b0490004ed46c322271203c8af80
SHA256bdebe91c4e30cae66aa8a9e620da63a3d143ada32be66ec4a5c40cc1f8361a16
SHA51248737dc37887c1018720abe7d9735637900163f2b97f025df8497c7f41d28ee6d1d04e21be8a3902b37f33aadd4f85684ea9cb56f6ec644471783ba5f0543b01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4b6385fa83f76adb589ddd46925ad5a
SHA15a9f38491b3540caa513ea2000a13674a6b88fd2
SHA256bda62e3f63e50ce23bb19552099450159c2468b784b55817c778b57fae170844
SHA5127e664873a00ac5e641beed35bd6125182891d5c9b1cf82f9743bca2dac321afabc7db650832f1a6026b11e00fde1d7dba6177ac19a23dd00ba2da6c5206b0ef6