Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
-
Size
461KB
-
MD5
854c9ff08277a9f2f3be5608d82513a7
-
SHA1
95352ced837aa962f77b17c1f1ce3023e5f60bef
-
SHA256
2a1215e29748978b91aaee6fca39bf86d38a1adc8d448df07b68cb9e21a23091
-
SHA512
5b38fa2da642c7e2de53bc03893da45c24ddb2faa869664defb764a506b01835b0b9728c36c9d14b059105999776dfada49fc9ecf0ef3acf918161d55eab156b
-
SSDEEP
6144:SOsMYod+X3oI+YHsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3t5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 680 msedge.exe 680 msedge.exe 1844 identity_helper.exe 1844 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 3300 680 msedge.exe 82 PID 680 wrote to memory of 3300 680 msedge.exe 82 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 2000 680 msedge.exe 83 PID 680 wrote to memory of 1956 680 msedge.exe 84 PID 680 wrote to memory of 1956 680 msedge.exe 84 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85 PID 680 wrote to memory of 1148 680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9736148991748571301,6156129624151727397,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5c788f32e403d1329ff0bf1ab49061a06
SHA1a2ef97c81f6f5a6258901a8b3f6bbfbdbe6e0453
SHA2565ece946e60a50936606e6a15c5849d70a16915406b213af8092cde4f5d9bfc5d
SHA51210742af284a7b18ec426a588aad15cbc67a8a8aba75198af849fbcdbd771203cae5b2382409563bc512ebdaac098ee7b4e1895d971b5b79d6f396597da49465f
-
Filesize
6KB
MD529a8ffb25e5664434f679c08f4f54017
SHA128234141fb483bf49e7c314537ceb4dbe3e6dcdd
SHA256b4f870805e506da35534f12afbf999bc69a3e83c210724c923db069b4dda0e98
SHA51217b6ff9cb2ac72e77b4ad76807dcf66c42400b2f2793d528ca0a08f4cbb08ada501277a2ddfda108d1c15062d0b46ea8720f0faabbe8acc6d71efbfe1f7033ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53ef2a4c062b81fc880a158af3d120938
SHA1b2f4c64e9f7aa12d3307562f858f8fa763e6c2e8
SHA25664a2be8d05270ee0f5ecdbe16fd54b115d773e7548cd1f5904faf26b9f6204f8
SHA512062ab862eee48b3c75cbe74cd1509768f1558ddcb4f026af4bfbc308fbafece7d077e84d835fc693f91ffa54e946980e636e8a0a33c930e1f8f3122c941ef177