Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
8fb3bd091453a2062354d680d2458f55_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8fb3bd091453a2062354d680d2458f55_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8fb3bd091453a2062354d680d2458f55_JaffaCakes118.html
-
Size
86KB
-
MD5
8fb3bd091453a2062354d680d2458f55
-
SHA1
55dec95abf007fb60740e4ade97b86c497b1b63b
-
SHA256
4447e4b9ff6289aaadef2ed43822572615137b18a2099d136187b7022423c203
-
SHA512
ad7501249120b3b192a4d2b1aeab036b7ed114219b11b0bd8ad03cdc6d06d4a829b667eca8defd63c9186b4f616ce813b920318dfa8cf7afe606ee7cfc24db7e
-
SSDEEP
1536:O+6RgZ6/oRMs4nruUohYt/RO4D/f19v/IBcNyiK1skyBtcWeLExzOz7RrA:96RgZ6/oRMs4nruUohYlROKl9vgBcNy0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 2196 msedge.exe 2196 msedge.exe 2152 identity_helper.exe 2152 identity_helper.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3540 3188 msedge.exe 82 PID 3188 wrote to memory of 3540 3188 msedge.exe 82 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 4832 3188 msedge.exe 83 PID 3188 wrote to memory of 2196 3188 msedge.exe 84 PID 3188 wrote to memory of 2196 3188 msedge.exe 84 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85 PID 3188 wrote to memory of 1424 3188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fb3bd091453a2062354d680d2458f55_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8426246f8,0x7ff842624708,0x7ff8426247182⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16376468124692813344,14713060906209780503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
465B
MD5f6d273071ea2d5f8521db2e93c57efea
SHA17bcf6ad88e9f12659d9d55f55eafa2b3ee4c19b3
SHA2568d8bc546e7a57694a64ec82feb020a0df4c6744317b0e4d8d2b6ecdb1a4fc954
SHA512fd7e7b2c55b5ff219a372bb86b78958b658580b59c0a8a9f1139b16984c3ab82d3d898d9930290b1df1f1b81a972f8b11f50ece1aa516279ed782552c15e9bfd
-
Filesize
5KB
MD52c418c6e6f8ea483b5e93f7796c62734
SHA11eeb839b34ea5ecbd82ca52212d5a74481928771
SHA256ce1602049a68ec7d59ee39012f253c437ac060969acdbb72d96420ef2088fec1
SHA5123fec251f2aa3ddefaf748ace980b88142b66afa12d7af841328c93cb4efc828a7fe571f4f23eda002b033c5254b7d9e367c44b8cf84b3595c12426d13b416c69
-
Filesize
6KB
MD51d73dd1f47f901a93c0ebdd527b7d17a
SHA1664a1b7061397757f0233ed870a98703fe7f74ad
SHA256abc0ef82262f650f049c1cb9953be2fd6ee5d9f54704505930900e8ad98c7feb
SHA5127de3ec9d6babfde6ebc0b6e973957638ee636b6ade7788f4d7dd69b4782a5012b64ea8c13b60ff0ebd97d0594ec1b821de268bddb0e483ad5ec1261c5738e223
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aa91ef6387d5a0f2b01c908523aab13f
SHA1c627c89941ce7a589e9609d03d6b356d2e6d728e
SHA2565e49043c50c38fb0a48641cc009b1bdc07a9c20061d1e31b4f602da627d99e9c
SHA5127e84d59ac6c80d7f7cbec8482a2bd9229e8c3c51099d27a96934a7aba4f5abbbd05cb6573878952240326684e49b6d03476d38065e555828b01758b32e0f5059