Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
9280b63bba2573c1270e60d1e7419392_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9280b63bba2573c1270e60d1e7419392_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9280b63bba2573c1270e60d1e7419392_JaffaCakes118.html
-
Size
15KB
-
MD5
9280b63bba2573c1270e60d1e7419392
-
SHA1
4fc5e169fb442160c54a3c76cdca0a4f3eb9d964
-
SHA256
f42c78a3dd73dd05c9c4dcd2f16b81b255f2fd434fcefe96b79695071f7ded4c
-
SHA512
6e7c486b56b21ad38f24ca47895014ae807b70ae647e9933522c74d437941ea704c8d750ff4ebc61623b75d0ca0b27f4c5dde6c5ed7947ec3b35aaa26a4e6d00
-
SSDEEP
192:stxCaI/coM/MNT0/eq/YQQFP11UAa/6QY0PVXa68:stxfI/c/S0/ezQQFP11UAa//YYVXa68
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3236 msedge.exe 3236 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3268 3236 msedge.exe 82 PID 3236 wrote to memory of 3268 3236 msedge.exe 82 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 1288 3236 msedge.exe 83 PID 3236 wrote to memory of 3232 3236 msedge.exe 84 PID 3236 wrote to memory of 3232 3236 msedge.exe 84 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85 PID 3236 wrote to memory of 3592 3236 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9280b63bba2573c1270e60d1e7419392_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe730346f8,0x7ffe73034708,0x7ffe730347182⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3155889099722257339,5216422718151889136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
187B
MD51b524fa3513814249b886c7b8db24138
SHA1685290cd447b81dbe3b38dd4e0ebc7a3cd72bad0
SHA2564bf44a86c46f41dac1c5428f69693d0461bd69ac2160f229018363892457f9f8
SHA5124f52d56b197c20caccb09c512e075e5a03cbd5972ecd60bfc738b8699d405b2028460b2ffb521717a3520884c741806c504bb1f7ad167502a8b93d00172ae950
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD599b3fcdba976bc4fe92debdfa57f0526
SHA10871ce07a4b612b00ae7fb52a6b114dfb8a102f1
SHA2564c94e664149d3457266c633f9d2deddd19e93313a4204f64897c2c76fea6339c
SHA5121f5e3599453b12bc252e30ca0fa24c64f533813f8d177b7ec5e6f7056e8f914b715b2dc3f1036c13d97f3226316dfc7b0979ee94b5386976eb07678910ec62dd
-
Filesize
6KB
MD58dbc9d20fc2c39a67c29e6e4138959c7
SHA1d6ab2ccc74f6284f466f51828535f45a211fe636
SHA2563a5cf58f374a7c71c0ff7128ba65d50a06b0de4b9da9594ef2c7b365c5d7b744
SHA512c551179458cb3a904f5e8aa2218eca83a199f6ff9967339884ada182a5cd01e95372272f337cd3a3e34f2f6bd7a25c5706a4a092da6ba260a4669c9706d08f4a
-
Filesize
6KB
MD51acae36bb71efaaa55a0e4186e9c0783
SHA1e82ce14c2dd70bcdd6c3c27874aa226782671234
SHA25641021f829d6571f3bad6e272f8fe44bf74c4a1373d63216f97a13af45b03b6e3
SHA51252965ac0a70c5a7205a99fcf631562e8aa772ad7c25fcbc03b9196efca87173f92010204792bf9cea145e57a91d0f731a931339f2e6b9c14eaaad0153fa76178
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ac9cb3a1802245f3a0d726b8b4f56682
SHA177340728de92fca9cda52b87301c793d6e80b494
SHA2560684aa044710ff21071b474b941aec43d28f1f8056f17c3c65a3b6fa4488041d
SHA5122cc15022f1976df55af7c3fc93eec4e8b83a64774cb0d253dfebf8113dbd6b250c93d800c900d04fdf765543a8a0c0761e761e8abbef7568b23692f86a3df141