Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
80984aa1ffcaeb2480be62359aa27a85_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
80984aa1ffcaeb2480be62359aa27a85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80984aa1ffcaeb2480be62359aa27a85_JaffaCakes118.html
-
Size
497KB
-
MD5
80984aa1ffcaeb2480be62359aa27a85
-
SHA1
8d1d9484d595d1bb9aefbaab88ccd688f1eac757
-
SHA256
c88570f2d9fc1ef8cf37d6f90af5f2135d6a4e0b9528186d6d10f9caf8d4a960
-
SHA512
a984df129ac8407e28006cc54335173b6c3410dbccdcacc731a5c9c307fb867531b9380e65f5b1ae6b5aa192003705099ff08a4a5bf1da39612da375bbaefcbd
-
SSDEEP
12288:pyeuJZLhImxE4aJEerYNz3upZbjsbLO1c/qu:4BLhLKp8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 4136 msedge.exe 4136 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 4216 4136 msedge.exe 82 PID 4136 wrote to memory of 4216 4136 msedge.exe 82 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 4652 4136 msedge.exe 83 PID 4136 wrote to memory of 1728 4136 msedge.exe 84 PID 4136 wrote to memory of 1728 4136 msedge.exe 84 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85 PID 4136 wrote to memory of 4284 4136 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80984aa1ffcaeb2480be62359aa27a85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9d0c46f8,0x7ffd9d0c4708,0x7ffd9d0c47182⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8672048912924853119,9081026460756106930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
326B
MD51aac375b60827b9859d42965b9701704
SHA19147ba7c2472942aadc3808fa6e108fd02db0161
SHA2564458d711bd3329b93eef1f32fd1d8dc86b204d0dc4d25e298c84a9d4029f4645
SHA512f1252f9318554833230d72fea3a846693f025c5c75b4bca736f092c0106348c86f37c6bca3085fc8dcb4eaf74baeda59952e415f255820d70a8764030b2795d4
-
Filesize
5KB
MD5445b462887bcee36f5428feb22e587cf
SHA136daa37e9e48ee1744f76029e7be40a0f79275e9
SHA256e1b7f8c6938abe129b5a69e04f134410f942906861bf41b1e04c9d21498641ea
SHA512c208e80eb3863fb3dbd98344b7fbe397c20f79470c4f8187f7641febb2a39bbe6a2aae5170abbac0e0b5bce5cbe7c977a9d324aca68852cbae60dadc1bd4d754
-
Filesize
6KB
MD56158f936f8439c4e2771f0f391294f46
SHA1aa1c8f592f9c2f1e1ca2ead5da2660fb3c18d592
SHA256a36bb1971d9d2b4836ece63607adc0f15662507efa1df7ba04661b22c58cf1e6
SHA5121f5f534272ee85127622c196d7e9bc0fae09a3c91fcb5d985a9b07316b2fab4afad54ca886d4a8983c19fc28516d1cbfdf9ffd6a3d429c74234a31a3c99613ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD579ff3f78d31cf75d5cc107822b1c3295
SHA1736d22257e23717e5c9a7b1dbaf01f099fab22e9
SHA25644183aec0f50008bb6e16b87c4ce4e774cf6e6b60be1d3d7d9c48f1952f505d3
SHA5129a406fd086ae4f70c54606a233f6234e3c3bc4dd89355359c4186ef130fca0c5279f70ec2cbb7bc4afb1cc8efd99260b6cee1b4f768c6b83ac94f21789a97301