Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
8d2f8415128383f48d576c3407235811_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d2f8415128383f48d576c3407235811_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d2f8415128383f48d576c3407235811_JaffaCakes118.html
-
Size
23KB
-
MD5
8d2f8415128383f48d576c3407235811
-
SHA1
223bb710081b152adee8a148d009e1f243b5717d
-
SHA256
4aab672db5c4760d654153383a4dc199818d28aafa93f135c2bd2766710c1a6c
-
SHA512
e0e819ff5097ef2373546cf49f6ff9b7540253ddf4149c3dd8dccfa5102d02a4ea7191c80a4804acf56cffa2a5d71864dfffbaa8e82fa130f97952cb3a26a67d
-
SSDEEP
192:UhEbNuD6ciZaCvXBMC0++gfl+RAzTAhFaCMWq+6vOWcQ3q3igb5eR3wuGxXmOeqv:UhhD6HvBMz/QCFRMX6yy5M3umDq3qcN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2304 msedge.exe 2304 msedge.exe 1308 identity_helper.exe 1308 identity_helper.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 396 2304 msedge.exe 83 PID 2304 wrote to memory of 396 2304 msedge.exe 83 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 3708 2304 msedge.exe 84 PID 2304 wrote to memory of 2516 2304 msedge.exe 85 PID 2304 wrote to memory of 2516 2304 msedge.exe 85 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86 PID 2304 wrote to memory of 2972 2304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d2f8415128383f48d576c3407235811_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffcce9946f8,0x7ffcce994708,0x7ffcce9947182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,17855204860384079445,17320933368308880129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5520cedfd54df3a379a788fd6c83dd1b0
SHA18ec8012fad2f6afc614c2aab45d544b655510c78
SHA256c43c7bed49f9c817d0dbdede7987f2b04454fce80b57d33e084607c6d6f8188f
SHA51275ffc303f3a126e75556d75f3dfa53326af6d095a03d1c98b0fffe2c1a97bfa007d876ab8f5353954650ed2409ef3f56d586f5c0b735bb432b5f21f7c73b9f3d
-
Filesize
6KB
MD5484c14617eb132e5f3be6890023cf7cf
SHA1075967fc573c184289fe4deca20e1f905ed7279f
SHA2568ae7d18a409d19ccac756de733f3c30f6a2cdb75ff6dbba9acd627a887ef186a
SHA512c649d5bfbbdf8585767b439305637eafebe2b5112bafb7f667b3bed0013eaf655641d0946fa216ed5caa57bff464269faddb8db137cd130984a1628816e9d55f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52847066d4d8fb2ee6667966fed42fdd7
SHA1b91c02ce74e4db249f4f3b9a097c99506494b94f
SHA2565ec6407ba9a3d26df60ab4f2968d65a2ca75d03afdb69c9fd31a4c6954a8f2fc
SHA5126959542f897a7cc53cd3c5dfba28a35278d4b93da509009a0e42d318e79f27394498150a1319eb715cabd364b1fbec50915d3159685ca031f484db4fe2dd518d