Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
840ae0a61d6cc4166f5258a398379f70_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
840ae0a61d6cc4166f5258a398379f70_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
840ae0a61d6cc4166f5258a398379f70_JaffaCakes118.html
-
Size
33KB
-
MD5
840ae0a61d6cc4166f5258a398379f70
-
SHA1
7e57b5b59c9ea22becdebb1d408e5b7112c49b0f
-
SHA256
d9b0c01677a3685e3d5d264371c4e06d7d174a93d043f18d96c177c7b203eebf
-
SHA512
4b8d624bd1b5a023501015be6717e8600a1215a339b1fb6e8eb81c7ab5288539c69741836fda4b9bef819b5c61d1eb8c144b9df7ee91d5489349f3f912d86868
-
SSDEEP
384:lv6qTohLSDvJa9yfeUb6fi3OzzgQ/STZsdQoGoVBt0k3ZQGZXH8HWHO+L9okUKNY:1oMMc2Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 4820 msedge.exe 4820 msedge.exe 1112 identity_helper.exe 1112 identity_helper.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2348 4820 msedge.exe 83 PID 4820 wrote to memory of 2348 4820 msedge.exe 83 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 872 4820 msedge.exe 84 PID 4820 wrote to memory of 2104 4820 msedge.exe 85 PID 4820 wrote to memory of 2104 4820 msedge.exe 85 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86 PID 4820 wrote to memory of 3224 4820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\840ae0a61d6cc4166f5258a398379f70_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,599791537539692698,1540790689233884120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5cdd7df5d072a1a2e48f33b7198fc9f79
SHA1278836bd2bdcdf05bff24e9850e245dc551f4019
SHA2565d2af3fbc292f7728ca9f73444a75f90f34b2f989ab9fab323dbffcc5461e963
SHA512dc751171af9219d0511332aaf11cff49f5bad13e1d9a3f3b3afea22797bb13aefb485c1c9c82a1ddd0235df7db6bca1bc32e9e42df84d2f1a26469292337757c
-
Filesize
6KB
MD526af6e1c6087d1c6cd8aef36016adcd5
SHA1e5fb5db7ca50d76d21d781069b812ce3e0d33cc0
SHA256b3c34e8e221c648cb21200a31d896e09da77b183108ad139129e1078d53e6619
SHA5125ea023a3c0d1e57242cfc62436d3986fc44ba0ae49e4d26043f4c8f65a07ef21bb36d2d0dd4552875505c379cd24d267de5d559f85c3ab3fd050a1dc2f43260a
-
Filesize
6KB
MD5a687e75c21cc9d2e75b6800d29884999
SHA1696cf5fdf7f7c16096460333dc4ed8f4153c31e7
SHA256ff20d29d0de94418a93aa8ccbd87feded3b6e5519296da29a10e47a708a4d8cb
SHA51261de0b36701175d2b779e9a9efcd5840f98cbb72de8e4e34f80aa4e23ddc06e8409ef2a3e225a0cc8e2473c2d8db9b262175e169e563dc2fe4e6435f3435dbcd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5248d9a97fde2199814b3bf5c52f478ad
SHA10bbd86aa06f584213976b0125ec7b3967091b421
SHA2563a822961c5e1386df91bf4999a53fe2219e6a6bea72e987f0a44e866e207e2da
SHA51290709e23a7317a5fec0f5f7f54ed1062bf7831803c62b3ba548d6be41b0964129dfcaa6790b86ec036b0e301db7719b7f48d6b755892a8752876247e2ee191d0