Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
9982783149b70527f61b6d11527f7f54_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9982783149b70527f61b6d11527f7f54_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9982783149b70527f61b6d11527f7f54_JaffaCakes118.html
-
Size
54KB
-
MD5
9982783149b70527f61b6d11527f7f54
-
SHA1
5fd520593e772b460d2cb15ed7b2bdb6875e29ab
-
SHA256
444c5b441bf7bc4623eb57c937d281aee47c1ec4b71550fac491fe6bccc5f51c
-
SHA512
e3bc17e9384bea1e8937484b0b2e8af4601d15eb9307960090f948d281c240283c123323491eb2d0e34366b49bb5caa0f00d3173b7cb466478a334e954731d3f
-
SSDEEP
768:Xvw4vPr032M5WU7WU9g7x9sqbL7hH8NEzocfGXzESD9zD9r8MqUsRx+/EV:C2jsqbL7hRlIEV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 1296 msedge.exe 1296 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1888 1296 msedge.exe 81 PID 1296 wrote to memory of 1888 1296 msedge.exe 81 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 1120 1296 msedge.exe 82 PID 1296 wrote to memory of 4444 1296 msedge.exe 83 PID 1296 wrote to memory of 4444 1296 msedge.exe 83 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84 PID 1296 wrote to memory of 4200 1296 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9982783149b70527f61b6d11527f7f54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe875746f8,0x7ffe87574708,0x7ffe875747182⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1120593397166357536,10145549818677243312,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
592B
MD5b07b0de0b66d4ab09b02d6f74d50cdaa
SHA1bf666388ba46b594e1da8da2e849b9c5f98df9fe
SHA256049c46ca8c1611063bfe42c3165973186939850d7a8886d2232ba8e6db35066e
SHA5127565ca920976fafa98fded41f8c33ebeff88f56123b67f39e976387eb5e03f0894a7ea27c790da9d932981b49f9dd77438781deebd3aaae7b4d832520ee05c8a
-
Filesize
5KB
MD523963f4a7945bd0bfb7ac8fa3045ca96
SHA189b6108328443a81956e2198ae23b33f0d646b1d
SHA2565da391fcca2ce50e0294788bf627a428dbbec45a931d3b3a747f7c350a8cd69a
SHA51297bffa3e1a04937ca7cc2a28d8278aee87132b19892e4d6f28aa6fcb69746ffeecec99101c3af8218eb750398111a99bb77ed79b0db2a04187e8721d965838d1
-
Filesize
6KB
MD58ee8d056b9be4a7153a78879d3f3bf86
SHA1c2ff0bb46cbe65712be41a729573ce4f8d58f2e6
SHA256921827053dc2744db528bfe7596d4b8f968b5889e92ef2a55c4fd37ba2eeb5f5
SHA5123c2e5865a60d9f102fc53d0e70be6891665289e0cafe8a08a05a7f9abc81a58605c15329ba841218d8e1ccae32a2281fbb65d8a03f0d3ba0b555d571d1b11602
-
Filesize
6KB
MD58667bbed18da208acdc3607a10c207df
SHA15d9a5d18641add289ccb58d57acd93bc1b444377
SHA25682729280f603b6b322490ab37150635bddc7dbd07883ca893ec91c1b4896d45b
SHA512fe68412f321edd72a7cb0efb5d09f7cc6bf3ff8f9096174c1c9320a46144e9d8db000d4b669b5ab477cd249e7905e73c1beaa28808fc44a0c3895cb167195e7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a130f0d61a33c1bb6b8abd8d274702d2
SHA1f82f923765ec9b901cfce537c8d7aea01011096e
SHA25631d4ea2687ebf2b972135090691b45484953c6340578f6418ba71d3e18ed241d
SHA512fb5c12c14bf06e559df201b994de3cab5d35d51c5cc6df0b7c26777f6b6fd988d501e6fd961453a2296c0fbc64918f2dfa47ed5e5d8f4bf771a71010b724e642