Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
a42cbbad5fcbb64998d205269e4a10dc_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a42cbbad5fcbb64998d205269e4a10dc_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a42cbbad5fcbb64998d205269e4a10dc_JaffaCakes118.html
-
Size
94KB
-
MD5
a42cbbad5fcbb64998d205269e4a10dc
-
SHA1
a7a3559fc612207db34cee9e119264ed7820eb85
-
SHA256
80b4b7967eda69bae5ec626424350cf09ac52a6416962096c8ea045f51e24d2f
-
SHA512
5b47eaa50a4ccd2c923a6fd54572b051724736a983dd076757c3dc052cd0a1edb544dafbd89d293f76460748c3f98f7e0013919df67486f5771b319a95cf8bee
-
SSDEEP
1536:WMLiNgFLUjyWfCO9oZ4fe77LUbh1X4rzyz/JZeDBdkrY8mgHC+qpEyW:WAiFnoBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 4552 msedge.exe 4552 msedge.exe 4236 identity_helper.exe 4236 identity_helper.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4552 wrote to memory of 4952 4552 msedge.exe 82 PID 4552 wrote to memory of 4952 4552 msedge.exe 82 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2620 4552 msedge.exe 83 PID 4552 wrote to memory of 2636 4552 msedge.exe 84 PID 4552 wrote to memory of 2636 4552 msedge.exe 84 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85 PID 4552 wrote to memory of 1532 4552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a42cbbad5fcbb64998d205269e4a10dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8554b46f8,0x7ff8554b4708,0x7ff8554b47182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,1226299502636447914,10978095623662730970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
6KB
MD5f5549e88c4155c740893e181136a720f
SHA14e17a04c1bb9409cd257431255a9c36783a6b2a8
SHA2569e1de3e9f3fade083beabebe9d0febd162ea2ef50c38c32b9bd2e4eddb23c689
SHA512010c2b842963b24b9dd23d24d0b17b0df209cb3f542c83fb8488f46bb96486d167c644bb325dbfdee2d6ddb07511b3e96a8f5ed6d42da23cae3d10e7017a97e4
-
Filesize
6KB
MD56a1d1d1dfcfd9389927048539c7bd28f
SHA13a4a5275baa6f64bb979c1c90ee0087878f8edf5
SHA256f24c22dcfa0af348cd98779251254de8ba7365be72ab339bd361252d7759f356
SHA5125798e733a57c300a941843cbaccaecee65f9858223832de5a71b2fbdd9c8a23cdbdcb12e584a6b26524cddb26e47547ec32d26811e5bce7c9314e5caaee46821
-
Filesize
6KB
MD5eb6da034d900c35a1f5e5f189382b182
SHA1015ad8156c34bf1c792fab6e9e9f77b8a1e8db8f
SHA256694cd8692a4522d5feaab6ccb66e16c5b138260aa8ba690a4b31c53888a62ce7
SHA512b82721787de873e09bd2821ad6f09fccfc18e0dee49a53cb60b7c95832805be1b64bb0932220401d50d43f157ff146851c79633d47729606d2354f056c8cbdcc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565c06aeba5e68bb4e278d06e838a3f7e
SHA1f4871c0bbe47fb08eea69e779588cecc49ad8348
SHA2567558ac55db565fd02664d3aaeeddfe5973c8ed8fffc3a5ee9ff8381887b01f34
SHA5125c2159b4328e613cb1e254c8b26353b27342d0c2a9fa4804e2359c13341ef02fb44bfa572d20d920f3ddccc54b74f0b5d42c76715d9d0ba5f6ec88326f354f8f