Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
9213c4376a17328385af87762a95e503_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9213c4376a17328385af87762a95e503_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9213c4376a17328385af87762a95e503_JaffaCakes118.html
-
Size
203KB
-
MD5
9213c4376a17328385af87762a95e503
-
SHA1
e42bcb0c485420ce749a74d0f7eb16a2279421b5
-
SHA256
6572ded85df84c7154a3b1dbdc211eadc82c24c398e4508033d0a1ca51990ecd
-
SHA512
ba0552666d2b7f428cdf88875402265506e95a054b8741a28cc9c42bd038d0ebd174d8bccf700ee60bdd09be3ca7bbb494658dc9e5edd1ffb850a0682041d737
-
SSDEEP
3072:eGDHRHm1r8TcJsKCUGocyGmfeaOvzDt4a0:eGDM1r8TCszU1c/mWa4zDua0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 5012 msedge.exe 5012 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1240 5012 msedge.exe 83 PID 5012 wrote to memory of 1240 5012 msedge.exe 83 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 1448 5012 msedge.exe 84 PID 5012 wrote to memory of 2128 5012 msedge.exe 85 PID 5012 wrote to memory of 2128 5012 msedge.exe 85 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86 PID 5012 wrote to memory of 3688 5012 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9213c4376a17328385af87762a95e503_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12029048859534212686,6220675747203889969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
182B
MD521288b4d9c0c0113b527ea64b5388e34
SHA1634686f9842986ab0a3419eda6aa8f70f9c388cc
SHA2564c7d2bb7f631e4d60278030e90bba17d19e024ba27d9b3e980587f3525561788
SHA51245cb5e6cac3cff3a39b3e7f14c3b7eca0003c69218d69a8426e7cb843ac87dcfcf5e8e2149da337265a8ad2aa9d899956686a7dc569875dfe33efbbc3ee50d71
-
Filesize
5KB
MD52f309b5c809fb3a964a82cbd377eab5e
SHA1bf00ed54e52ba858ab2b483b44a54f9c10802933
SHA256b3089ec769faf50b56a711b07be6920bee7d54b93c76e1a5cad6447650f708c9
SHA512d3d7105a6a2d0b5b9e3460c1ac38598f16d00fca668702a66664f9a45a88bb8404e30fad3bde5803a99aee08e369a13cfff272df76dbb912702df8af4c907d21
-
Filesize
6KB
MD5a31540776ddeee9c6c8849ec663ed93f
SHA16d48aa9c890129f3357b2d8d0a0ffdc8f2b27f3c
SHA25663cfe49020b5f5fd32fde0a9b357ed60ec4f8dff277c02b84b7ef8927c45afd3
SHA5121f23633501272b146ec57d35508e77cba15098f08570f97eacdba9ed268a4d4bd1cdc5ef1428078c8414977b72ef909a3841fd22fb028fece88df66d46ac0c44
-
Filesize
6KB
MD5233bd4359efcdda380fcbb9ca6e5a90d
SHA116b59040f2b607c7b5e6edfe5b2b06471717b2db
SHA256c8e456b5b323e7d1e93b4badf2234c5df7e3e407aafb2df46c4ca35db8b302c1
SHA512f68a11184e373bc3ae0507ba841ab804064f770a58dbdaa8acc46ffde4c82d2da8df4f1cf9f0ab9641983844fac51b00b86d8649fae26daee152696fa4a3577c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59d35720bdf50428488de438e05372147
SHA1e5f233ff1afa8211167a4f1d7b488a52ab1e9443
SHA2569225aa674877ef0cdbef8d9537cb2352dec16e992051db06e751b152ebf3425c
SHA512edd8b4a82f06d226a4a2b8a71101edc72cd8eecc80634c2efb43a6ddd527b6a1a6276add191a66004ccd01f978ac9ce9c3bdf2917007a7cb62e98e707c58669b