Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
929b5e9b5189a1be309ec618bbd7445c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
929b5e9b5189a1be309ec618bbd7445c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
929b5e9b5189a1be309ec618bbd7445c_JaffaCakes118.html
-
Size
201KB
-
MD5
929b5e9b5189a1be309ec618bbd7445c
-
SHA1
d6567e291d0b57d139bfd29929af2f602338e241
-
SHA256
dca5081e6f789cf7f29fe708613c618781cd2321a5fb65f41819c3c5a918c205
-
SHA512
74fbca9f3270323f618d64015cf57b708f1d177bd368bb686a3c02dde09d3eaaad934f78c8496301cbfc8dc6c9b19416fb119c7bfd8f20594387f921bba8f589
-
SSDEEP
1536:kaenzEA0QywtIS4xW9cc/1TXICOD/wr3GvNbGk5XZMsGvM:deFTXRad
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 4888 msedge.exe 4888 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1416 4888 msedge.exe 81 PID 4888 wrote to memory of 1416 4888 msedge.exe 81 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 3136 4888 msedge.exe 82 PID 4888 wrote to memory of 1308 4888 msedge.exe 83 PID 4888 wrote to memory of 1308 4888 msedge.exe 83 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84 PID 4888 wrote to memory of 4824 4888 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\929b5e9b5189a1be309ec618bbd7445c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1472,17465024030258257650,14501281726902587717,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD598a0d8287e2856bc3872ff4515320ee2
SHA1330732124935d0f059eb3164d576256af2f0d095
SHA256f754b525391a778915cd2daf5106be5b2e3840135743aa23ac3ff83cdd407625
SHA512d07b4ada33dc1825ccb94f35167cdf99ed1347b2576c958447c8b780789b0752158014a9ae579c8b0b2ea815f34ccabda152990696d8d7061bbe617fc7436316
-
Filesize
6KB
MD57194902ed0ace597acef4aaefa036127
SHA15e9e4b57646e0302fd67546298b549d91e4837ca
SHA256d70a5d562888e0673eac4803459b7dfc9abe059dc110d8b123619c7f3cf773ff
SHA512d33201c50d4d31269c9ab8deb94f0a55c9c4344079fb9d5a6cc6292fc29a38047d648e6d5f5dd9aa4850e5d2abfbc7db311d64c1c3c8c642f709874c3fe680f0
-
Filesize
6KB
MD50a7d349073a40324af5eb831d598d12b
SHA12daba5a755a2dab50ba6d0292004a6299949a635
SHA256c96ef694abfb5dc16e33b1cc5ee432f3880fe280d5c0d09570142e1fed4e824e
SHA5128d425eaf57b743fbc87efe26a3bd8de4114ae339673452a99d1d2a053268e112367f8d60289c7ce624fa9eed02745f807429640b99cfadae07efd36ba9f75691
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ce3e7c51141f4afc891aa7416a818c62
SHA15ff1fcb6d016a98d2b17a9d1d6e84c57630a98ca
SHA25620abc9d0733c1d70fe4bf59d15baf1c8c3da1493113d65e149227d12a7d1588a
SHA5129da62360fde386a16c879b51af3dab16dfa06e0fe64f1c3f0958c99e47a1c98fc44b54392caf949147f6f0aa453f4f356b6b40820436b6dbc6717d30c43e74b1