Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
86939b10af850b12804aff68d98fd4de_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86939b10af850b12804aff68d98fd4de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
86939b10af850b12804aff68d98fd4de_JaffaCakes118.html
-
Size
142KB
-
MD5
86939b10af850b12804aff68d98fd4de
-
SHA1
b4e690cc4ca8235602edbc67097791cda8431f07
-
SHA256
c7155d429fc3cd4986099be6d0f1e2f10a0419f668c7b10d3800c32772e9fc1c
-
SHA512
8ba5cb56d99853a507188530afa82abaa4f7b099cc2261bc95398819bb93fa0a946f78f444608e33db72690a9d1dea7d34e9f790153d7685228e92c27869fe00
-
SSDEEP
3072:SJqOLy8x/nCS1dQujvpt15i3C9t5DyfkMY+BES09JXAnyrZalI+YQ:SHmsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3900 msedge.exe 3900 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4088 3900 msedge.exe 82 PID 3900 wrote to memory of 4088 3900 msedge.exe 82 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 4100 3900 msedge.exe 83 PID 3900 wrote to memory of 3148 3900 msedge.exe 84 PID 3900 wrote to memory of 3148 3900 msedge.exe 84 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85 PID 3900 wrote to memory of 2272 3900 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\86939b10af850b12804aff68d98fd4de_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,7920759263330753257,15498644817633161396,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD59823d26dce55a19ef5c3599db368d7ad
SHA1c588ee567aa32f3c56466f0a17a4adc350c5129f
SHA2566bc3ce9b36f7a7cac828e69a883cdda232f41938734f17dde54d47d828fb71cb
SHA512062af5cc1b7587d5bfca9fb966eb233cfc55f5708538c3216db999e68aeae1dfea2d216e82ec735004a663cdebe5f6af2e24cf36cf38515899fe9c5e66d5a74d
-
Filesize
5KB
MD5237042257d1d7e3e530ae21f7f37d7ca
SHA1aa6a4c428aa40b37bb5fd2982ee76a0070f71552
SHA256357d61602fac53e45d69b43baee00f584d67b809c6ea1ca29b0df602ec54e199
SHA512aef82893f7ff936c51fa587f91f937898f08fd8268e50a8010fcbc9348fc18ab80b427a462a39a9992fcd2e58f3136a3958c511174fd888c57eac6e83e7f3383
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD592aed7986331309390e3f8e40a3ccfe8
SHA1caadbead225c6c49e44ce03a9713bc2a2607f907
SHA256ffa96450a7ac5f791cee5df7301694c15b6677733f75d86f81ea3b6c064337f4
SHA51217a62b3e91cacc0f9852aee973ded635874f9e886135eec4b94c1b7af16433694093e9ed25ba43fc81677dd4fda1554cab4c0fba08be1477de3c025b875c300f