Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
932041647fa22da7df9ea22239e5606c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
932041647fa22da7df9ea22239e5606c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
932041647fa22da7df9ea22239e5606c_JaffaCakes118.html
-
Size
15KB
-
MD5
932041647fa22da7df9ea22239e5606c
-
SHA1
1584fe7eeb1e6c600457a29badde9157d40a1199
-
SHA256
86df90833fd368eb21002f1e28b51b61a08a48ee3da0cabae9a7e5c80aa69f2f
-
SHA512
5d4f9e81dbbff28d08365462789cf923a669ff50fb578d359a7a0c7acb72d62284ca1f3a046cf6197be44bc19b3e61c0453b059d3e4bfd7d7d83c01b0ba6e285
-
SSDEEP
384:tBBqtZRsVuEc+6AkuOENbGtul0LgIssbQbDwiTkBFV1aG/a1B7rl9qu:tStZRsV2+6AkPENbOJZYDN4n+Gy1JlT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 212 msedge.exe 212 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 1916 212 msedge.exe 83 PID 212 wrote to memory of 1916 212 msedge.exe 83 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 3940 212 msedge.exe 84 PID 212 wrote to memory of 2464 212 msedge.exe 85 PID 212 wrote to memory of 2464 212 msedge.exe 85 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86 PID 212 wrote to memory of 944 212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\932041647fa22da7df9ea22239e5606c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13707859968088357209,11542068429754624099,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
523B
MD53f5a2e39e4b4ce5692c1866d3c652560
SHA1b18f89f71304c347f2ef48b0257d42c545058fef
SHA256d8b9781e0c6a4863115e2b1aa66aea8fb50269d6519601a12994e40a11f5a89f
SHA5126eb5643ea71d54fab115a76ef9d0adf0108879f486b6eca0406f4c78cafe3361c24bce133c2eb044e694e64e90ca8885500f1b4675006885c6637926984a57f2
-
Filesize
6KB
MD55a6a8bedecbd304d32164bc140b37797
SHA10ed847ebc2f5d903c1d8e0433b00141f531b1f2b
SHA2565ea8bd025a9ff4984c67f4ed97f3adbb652bc6d9673bf127dd354ef1b186e692
SHA5124f872f54853426e9267f8999b85f4481696aaf562c47d3c2d3af4b69367701aa17da5b0fb00eecff428d8217752f1569468ce6d036ed44e305a3ba5167266469
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ec9cd526-0e4d-4e42-b3cf-fac8e68063f6.tmp
Filesize5KB
MD5656df289b11f07727e5638a934a0d9de
SHA17b2d35327ee3fea64bbd38bb69b95314695fea17
SHA2568a31925a8fe58e2158ab5dfc16dcc4e954470f7759c93779f9d45b9ce04a1e8e
SHA512c67266c9b9d7f6e6df0c5737c9b94f3442747b1405a67277f30a2e7e06058ca2808777e2f59353e6b2397a86aecaf8e3e00a7402435a5569e343d1d32c8b865b
-
Filesize
11KB
MD597d0d4d653d89c335abf728bcbebf100
SHA1d2fd13b28f43a37db0edd795a3db2a05136c216d
SHA256f61a4a4b59c60d15dcf9e7aff6c24c873d8efd35ab19a5e8744f2e0e31213a5a
SHA5125c2ce51f0ee57b865390249c68c1a201ca58f37f54caa7648aa4038f5760b611c341d03c6bf95b7b1e50dd19e1da7bfbd858d70cc040c45272ce5e1b1770762d