Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
80660dd19d877632b96ffc23836f5e81_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
80660dd19d877632b96ffc23836f5e81_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80660dd19d877632b96ffc23836f5e81_JaffaCakes118.html
-
Size
56KB
-
MD5
80660dd19d877632b96ffc23836f5e81
-
SHA1
3f0dc7f84a817d1f069422bd262040d3cdc7208e
-
SHA256
2fc186747130d6ffa21a34fafbbc94d17f53f22c07930475ae6067bcaa8ba159
-
SHA512
184beca25f3f8b29ee8d924e7bf6ce7ce40b0b354611ac25ed1ad2f6a3ce689565b42fbcb753e4e739341131a61123af1ee79724fef2ce429bb51e37c5a0b42f
-
SSDEEP
1536:3GMbWvUSJQvBEMyi9eRZKYhxM1GCAh4Wkm0Ctu8z7uA2+Iw1x6NpIa8ag4Rp:UvUSJQvB7yigZKYhxM1GLh9WCtu8nuh1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 2132 msedge.exe 2132 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 5112 2132 msedge.exe 82 PID 2132 wrote to memory of 5112 2132 msedge.exe 82 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 4932 2132 msedge.exe 83 PID 2132 wrote to memory of 3224 2132 msedge.exe 84 PID 2132 wrote to memory of 3224 2132 msedge.exe 84 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85 PID 2132 wrote to memory of 4056 2132 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80660dd19d877632b96ffc23836f5e81_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11340815975795835638,18194504309041047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
597B
MD58cd1f48f13116d8c55c7db6c75bbbf7c
SHA14356a52b375dc78300995320ad4a11a37b05a260
SHA256793f7bbb24c7d7759f2945a8d6ef467493800c98bb4a9831859b991bd06f0797
SHA5127af9b38bcf9e5bf26ca6224d71c5c96506de2e4e9e248ccb93d80dd52be3e897532daf85400b988f76d9ae158749e38cb2651dc0c4856ebd67522d34b1d51d03
-
Filesize
5KB
MD509d9cbfc2ed92a2c08e37000cc9ff6c3
SHA156cf0861fefd7b2dbf660366dd73489e048ea582
SHA256738b651dddea507a33a6932e5682cedc49e6d8c81cf185b8ab07d7388929acb9
SHA512ec23f989a9b9a27b0cea414c20e54c8cc48e9895b75a18c8c6b4d2f008f7f74757175bd9de5538fadb02def8768ccfa87c2d75969ec0ebaaf0288c674b36fb2c
-
Filesize
6KB
MD59310beb6782fb95c91c091ab1ee34f07
SHA1f6462388ff5a0e65bbe5db02ce32d1db7413f4ca
SHA25654437679300a267d4abd14f396325d801a4e8eddc9757765a99ab65e5d2d0b58
SHA51225789e272948b0f8b2f60cc849d7c54e92bc850db418a26e16028903b1905788079cde1af9dc17d396219da096f902ecfd71d7c85cd40046c070a84d0ab33b93
-
Filesize
6KB
MD52832ab3be04f91b0f24cf56e0578de10
SHA18678e62dee805be3e30c0bcc77aa89c3e64a2f17
SHA256667469fd9701cf546e060efdea1841d7e1987f88f2876feffc1abff19112fd60
SHA512ed0323447733f03f7502e48efdb03e10b1ff670889d252057d8c4e52a63a340d9eb7bb4833f96fc7eb1d2342369396f518775c0ae765145209c0718eb6180e30
-
Filesize
6KB
MD5697f80d81bd6073b032d17e24f7944e4
SHA1237cecc07c44c552897584b5f3ad6732e1ff24e4
SHA2568e01f768313036636cf96c5a2a0d64a4c7d27b64c862f48a807b5de1fd697a5c
SHA512cf5d70401e11ffb1365a53da42bcd308b9170fa5cc26d46331df2b0d8aeb95c7d94f7e5ffe5caa7fa090f3d054aef6ee62ca26e059e4bc8feba1660384023257
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9049884ef3c5faa3c035c4af3766ca4
SHA16edd3965e3ba4ad626449020d08a9f0a88f99189
SHA25604df501b15be21337d3289d9d1badbc47d9a9b01cabf6d7941f30b53ea1a0a10
SHA512d27a4c9bdc54f9cae32fb3b00712c96d27f46226af0c3cc35b0977c26ba2c0596c59f8dd1f10dcd3a563db860790951465d0732390a1a8a6eb37caa43b666c98