Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
-
Size
5KB
-
MD5
8d17ce64caa33657e922fc89e5b4c493
-
SHA1
d3ddeb053ba748e537cafdd08d01a32587a67947
-
SHA256
3d18b3003653cad635cb0c4d3bd392d723a3db49f75f834b3fcec0751c77bc38
-
SHA512
c0e14adabc93806c885b84b13347a0d0688d70bf1fa62250f544f170cfbfc921d5bedaef2664f0f992dfe7243ffd4f701f22b805425fd11f8afd4739fefb46fd
-
SSDEEP
96:kzMx6hCzGyAf5gcSZSZST9d8E0MXQVO7+d:oM8hu7A+VII7MMAn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 3172 msedge.exe 3172 msedge.exe 5072 identity_helper.exe 5072 identity_helper.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2636 3172 msedge.exe 83 PID 3172 wrote to memory of 2636 3172 msedge.exe 83 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 392 3172 msedge.exe 84 PID 3172 wrote to memory of 3228 3172 msedge.exe 85 PID 3172 wrote to memory of 3228 3172 msedge.exe 85 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86 PID 3172 wrote to memory of 4368 3172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8b746f8,0x7ffaf8b74708,0x7ffaf8b747182⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15443190551831145367,11433291517967500577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
308B
MD5cdf85907d69cd677161c5a779458038e
SHA176b6242a3779b0b27a10030516af09f73ede4049
SHA256ac227fb012c0233362da47e1bd561b37a6896302f731968978bee9884cd13e96
SHA512238a00adeef6d1d35c0025430521f386f0a36bfcc0c182afd8cfadf222220250084e41112e85a0315bcbfc38a60f858fae47e412bb3dd1af4697d34e7e0a4ac0
-
Filesize
5KB
MD562cdbf5f8c20cc4e5260c4f686e4261c
SHA1d5528d1523c589ac54ada6210204fed115bfec28
SHA256ce122e292619aa026cb2692cd0d9245a96538644e1d0eb63e84bc3c3f796e9ed
SHA512b61bd70a06c3d9f3ce89a3b24bbb08454a60cd1524dd2f7ed7c298f129098bcdd60bd72e62fcfbde78f15095333d4783351f2159c6f797bc908f0dc1541fc167
-
Filesize
6KB
MD5b30e041413ed3afb4e1f6cfc7834b9e6
SHA1c8cf5bd1240be26c90389ee04e7f3551436f15ca
SHA25637409586d2c328686a9b7425ab78ebadc2d9a0950bec376c39adfbd55b411133
SHA512eb5817663b792482aa8b2201553c809f358a3d801593f8a084508abbd8083953ebbddc6ae016e61ad7c87152c95c44e555c5c2c13a530650ee79250c8ee6b05a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c5b06bb23720fe5a7d03b964d59b29e1
SHA1f371a3fa5c5cb9125db39be5338c65df8d6b8e08
SHA256194e6b06840e217878457cdaf316c88ae47f5732a3d1cd2192083896910b6ff7
SHA5122207b81c7c26a62cdb64166b5b464307d72cef681b2b1a31d2c4c0fc1526dfa1e6eb1de226c445d04b9d8453b5150b65984a35eda943068cb3f4ec6877143dbe