Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
9637351468edb57f639b181f99a38f09_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9637351468edb57f639b181f99a38f09_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9637351468edb57f639b181f99a38f09_JaffaCakes118.html
-
Size
233KB
-
MD5
9637351468edb57f639b181f99a38f09
-
SHA1
6ce3c6ced722926e55d1c9081b84351261cc13c7
-
SHA256
d1e769a75bf91e74a580182c2176e1f4269770fb11a0531488638f8024fae277
-
SHA512
b8e2ce32348560981dba35212de64d513c03e8da95c0599eea8babbc807d664b018276d6090ac88ec1d391dd149e6b55373be44927b1070d706d944a48e5ef43
-
SSDEEP
3072:cbaL4Rl+ncWaeH4Vs7mGMlBG8G86h7SRyhlmCi:IaLpeeH4Vs7mllBG8G86h7SRyLi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 4936 msedge.exe 4936 msedge.exe 1972 identity_helper.exe 1972 identity_helper.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 5036 4936 msedge.exe 83 PID 4936 wrote to memory of 5036 4936 msedge.exe 83 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1620 4936 msedge.exe 84 PID 4936 wrote to memory of 1964 4936 msedge.exe 85 PID 4936 wrote to memory of 1964 4936 msedge.exe 85 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86 PID 4936 wrote to memory of 1608 4936 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9637351468edb57f639b181f99a38f09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7428689510112034095,7280057465775326237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
409B
MD542912e9ea3172e1f9d2580d490624721
SHA1249e6d6dfe36a3109cb3af5b5caaaa839d33e9bb
SHA256c0fec8857b5b58abbd8103611ab1d6f78392f6b315d8fc91c7c6757dacbb6e1e
SHA512fb184ffe0c0db33454781a90b9e4fe0ade02d9e0a0b130c06fd66312134df0b85e8c3caf8de18a6ee181160abab5820f37547b8c67f258d98309a6361d0dce00
-
Filesize
5KB
MD5e213206fab13cb75f3d24995b9181cc5
SHA19c50e72729295ac0bf49ac24b6901a994f2e2c13
SHA2563487fe6cf97c37401a9e0a3b5ae38aa65ded00f67644cf9660981af4496c3751
SHA512ada0df8434d36525aef363471218443b78a1a18f4c93e3f463507bf615fa75379c073458d7a2670f39da4aaa244c3e861a4db694a3bc52239ca0a296ed3e7461
-
Filesize
6KB
MD59081cb9e2b22fef9b17137620300ff9a
SHA1daa053bdd13e75161a1e124619d68b84ca6f8007
SHA256c3e8c3ac966af274039669cf19f4663dfe16abe4ad25953453ebffa692e34e49
SHA512235b27c405e0361eb6203c67fc84de466006f06fc20c4fa83e62d910ab81a69558ae6573b872cf116634a3f09f305dcc362139f4dff561225213f4ba42907bb2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59ca30614a6574778fbfa702ffb489b9f
SHA11bf8b6c5ca209b6c8aad0aad6f28eabdd51346d4
SHA2564b1c7c28e813b4aada482abea60da0ac68cde999a878750fdfbe7874d9d1a16f
SHA5128cf643c281a0db4b3d2242396409298ab71c6106675ed14fa7c2dae39bdda5725811809b6f1c9dab851478587cbcdbe22a0ac07744aef74170c9472aea2754b4