Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
82dd3e3d5279f80a1cebb13a810ad1f0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82dd3e3d5279f80a1cebb13a810ad1f0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
82dd3e3d5279f80a1cebb13a810ad1f0_JaffaCakes118.html
-
Size
21KB
-
MD5
82dd3e3d5279f80a1cebb13a810ad1f0
-
SHA1
7f2f31bc341ebb3f4591144aabe7c1f2f72fc9ca
-
SHA256
9aee5c30df3eb86533e914e7a70e99f422dc6b1459a9a2505f26d976c265031b
-
SHA512
f1bfc47c370c99ff24fe2fb61e6341aaaf4268b9447612a17afaf560085b761581fc117ec78ff0fb7ec32ff3de21dcada881127f4de51260b728294f68770a97
-
SSDEEP
384:KILEG577xBMuBMNBMUBMLBM2BMdBMEOLrAG+vSpOTUssss7f1jY9+9Gb6jVGkwtc:KzSCuCNCUCLC2CdC5v6SpKIRVRwm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 740 msedge.exe 740 msedge.exe 1792 msedge.exe 1792 msedge.exe 3252 identity_helper.exe 3252 identity_helper.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1584 1792 msedge.exe 81 PID 1792 wrote to memory of 1584 1792 msedge.exe 81 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 628 1792 msedge.exe 82 PID 1792 wrote to memory of 740 1792 msedge.exe 83 PID 1792 wrote to memory of 740 1792 msedge.exe 83 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84 PID 1792 wrote to memory of 452 1792 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\82dd3e3d5279f80a1cebb13a810ad1f0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9303d46f8,0x7ff9303d4708,0x7ff9303d47182⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2900309573035612466,16845049032987282152,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD5eb84ec155150b27a57981526347ee4cd
SHA1c0da7920bb432c9b9faced67f7bfe65133fb1cba
SHA256759175198cf1a73e6c9018c98a77a16f6fbcaf508b47f0f9a66e0dff7be2f507
SHA512f0fde83c116ae25c75f701eb0f42add7658828246eabe2fb2f4bfe369849d736ffaa8e6dcabf55067c951ae513f7febab8cc8217beb886eb5acd0a085337588a
-
Filesize
372B
MD532d2a0034e8eb199bd294e0dbc742067
SHA1dab13a292d32bf0cd71d68b4ee5d0744c00599b5
SHA2567165d8d38a6f06bc4454c15e2073d5a39d7fb6a9fb59d58007401a39a3b1ce92
SHA5120c75d58fb6970d4380e188ff8f4c241adfb77f4b5acac3de1d40569ebea37be20f5e2efd41b235ebd1c50792620446866cc3d2a8bd4891572e3c6338f79f08ac
-
Filesize
372B
MD5b341f1b168b4c115de6f76529dcfc41a
SHA1d001f3a31a5f6f44b2043e24bcaf97023b77c74f
SHA256823f93ae69ec343eee18f2701f4599c4333765778d03f8f60dfa4d0be2eb6e8e
SHA512eef5d65707b1e0388ac93339fac378a213594d8883437f7b1ec8f853c4dbf3bcd4123606b02755584d2f4e536d338aaab88ecd727fb9fdfacd71e43a37889642
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c5796829-fb56-4c86-9db5-b3c17fd03122.tmp
Filesize5KB
MD5ccebf25e41394917b65d438970ce96bd
SHA15fe2375914234739d544e207bd14cdd73e1f0844
SHA256a63ac1cc283fef5a84a15f9ab59296b595b9365b621754cebab14ceaf8eca70a
SHA512301a0ca9ae1915aec4157bab4b09926be21091edb375056f4da3d502ea5663a4c12d2ac85f8de7c8fce374691d040ae8f86b7c4adff82e4ed488bdaad2cbc11e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5225bd0a1b94546673d526fd766bcade8
SHA1beeaa13f151f2ef3511ea04ecbe9dcab9050dc7a
SHA256604b10329dcd0b51680949eb0f0989881e5492575fbbc39f9d8c7b7077f04292
SHA51295fc01baaeb7b9697dc0780e8191ea7cec2c2d8c1881e88f5744f017663d23e693ccd541690c96070d07893cf38fa9067fea69333c22b3a427a24b943e43ba5b