Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
8bb43062c5d5dd5e6193c2874472a187_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8bb43062c5d5dd5e6193c2874472a187_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8bb43062c5d5dd5e6193c2874472a187_JaffaCakes118.html
-
Size
28KB
-
MD5
8bb43062c5d5dd5e6193c2874472a187
-
SHA1
92af014574591d61f0c1f8402292a6b22114da47
-
SHA256
474e778b3173d3fa406497c6b9efc561f61c6678d83689ff240b00a46a93c968
-
SHA512
2de0988e602f40078489024bde17c0e6c2f4129fbd54bcc652c927003fc6c45c1af404570c83e3b709a2a277f45b5d22b4358bd72160e99c091bb048043713a5
-
SSDEEP
768:S0zdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQGPa2mlqtyUoGez2:SSdsFqvfug1C5m1CCCcmzm3C/CnCQv2R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 2632 msedge.exe 2632 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3820 2632 msedge.exe 82 PID 2632 wrote to memory of 3820 2632 msedge.exe 82 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 1212 2632 msedge.exe 83 PID 2632 wrote to memory of 3104 2632 msedge.exe 84 PID 2632 wrote to memory of 3104 2632 msedge.exe 84 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85 PID 2632 wrote to memory of 5056 2632 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8bb43062c5d5dd5e6193c2874472a187_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2176 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11998605862540400844,11930570085644953634,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
409B
MD531b5180f4b58a1f910a3d9384bd3b644
SHA1090b3546b6e056aabb8e57e14eae058721712852
SHA25659f40edcd0c34d6a7b36e84c1fff43beba3c1bb42231cc593272e8219dcbda78
SHA512d12613ed9fd1c6ac3652e1afe4d9a5eee47408d3bca1419c3806a7aec4268dadc44bf62e3931616e0fce77b49874f7a741d1090c1e25677c6fe16aaebd0933c3
-
Filesize
6KB
MD5527e6c2b8b235efec1030ca0c75cb6a8
SHA1398e2e8f4cabe5e425739150ea4369d524e9b1e9
SHA2569d5fbe80558de69b13ba24e07f4545c5171d46a3ca3c47ab76fc2f74fb0d9cd9
SHA512dfbf1701f7bff6a95c6d4d9d178ea7dc02a7671810ee309a437079f082c8138d2a9a21ecc8b7b3ae096574eb6ff7a8028c94eaa011240dc1a7f37f0fbb5873b3
-
Filesize
5KB
MD50c6bebb9f5c81b06d257ef17b1bd7567
SHA1816af1b43905de206ffdf736c13da86b1aa6ac59
SHA256a2165c650566a3a9e42a551d95b8ecf43d69df6f9a550707d4e63957ad17bc3a
SHA5122ffcb25217a557e2b59ec40577e11a254d426df6c9fd4750fa1f8ed5e049b513d7c45ef4187eef08e57ddfef3465d2823a1cd6ca3d2da29ef418ebcfb3d09f10
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51fd46e36cb15f9e95bcce8e919914a74
SHA1acdb0d74be2cf09d96f451e5d5d1687bc9835e2d
SHA25674345e3523b219e58d38572bf57605dec5b8f6ce953f4832db0933b6a1252d53
SHA512c7017d7b2ddc275c76e17177ca4c20d0a9c52953a30d5d1c4d27dddeedbd4f91a8acf5b91e387ee2267ca7a81283aee22ed8cfb1dcab8ac0fff8b4420dea2bbc