Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
a68e9e6c809d3da1210fae44e84c1546_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a68e9e6c809d3da1210fae44e84c1546_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a68e9e6c809d3da1210fae44e84c1546_JaffaCakes118.html
-
Size
65KB
-
MD5
a68e9e6c809d3da1210fae44e84c1546
-
SHA1
2921848c2e76672ab85e31bdca5e925c98d85c52
-
SHA256
e948a07a0174b00828156662fef66ae2cc241adddc8c82591c166ee59bfc3355
-
SHA512
766240c0a73d4321e0eca62b095fff8e4fc930a132c6a2275b9d158115ae525a229ff00eb5dc37fffa136687e222f4449c6d2011a8f807b4c6bee7b3374e01dc
-
SSDEEP
768:RsLFFU/JuOAX7t08u2zYhZIYKPiErJJSgKcGpABQ7vgb3prZh1VvdxVlbRFxDMsk:RGFFU/JuOAX7t08u6Y8rqgKcG+ysHE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 4108 msedge.exe 4108 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 5100 4108 msedge.exe 81 PID 4108 wrote to memory of 5100 4108 msedge.exe 81 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 2164 4108 msedge.exe 83 PID 4108 wrote to memory of 3404 4108 msedge.exe 84 PID 4108 wrote to memory of 3404 4108 msedge.exe 84 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85 PID 4108 wrote to memory of 940 4108 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a68e9e6c809d3da1210fae44e84c1546_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe35dd46f8,0x7ffe35dd4708,0x7ffe35dd47182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9827739499359004344,14273039481513107308,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
6KB
MD5c2e103e0b0586e67f2c20be137f9cb99
SHA13a1aee884efadceae911a341b8953f6e51a7a32e
SHA2564ea1ffa25b56db51881148220b321caa05941b1a915a2d8dd96e268273c23d34
SHA5127ea5d3aec96f73b210c647a43e072c02cdac4b02cdf42e1bffcc57578110c49324e9cef0ba6f561da17f6376568d450d24a5c59da45bcc8b8d16bf58516ac110
-
Filesize
6KB
MD58cf24ea7fa653af2a03eff951a372f1f
SHA151ceeedcca01f01d768dba62bc134630e6a55011
SHA25606875301682c6ae4fb8b5ead44891f58ae4be9f513e20f75af33da3c31d4d794
SHA512817c275515bc92a2c0e4e4902ac44dd1f5a5179c7e99b92e50ad9ae0bc4ec44fdadd9984950dc818932b53e050c04fda17b4e9556954c58e6b4328a71ed3e98c
-
Filesize
6KB
MD586b2820d945de6afad1002976eec8c9a
SHA1d30607ddc7d83fb1c177e2a3b3be268df09f2391
SHA256026682030e12c24f09627cf9cfd07bc2b6e37a13e0259193e45740418a4fc2c4
SHA512d8d87bafb1d24103faa438a54c121b74bb309e41966b32bb7425d10690848348fda7122e7e12cf44665f66a2c56d413802490d2d35797a0e526af412d7c17d84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52685cc394fc4ce696f4945d849e5063d
SHA1558e77a7061769d27b217ac12de22596c5bc6a47
SHA256e20ec64f1f230d9c5ca6aecb644fea353251ae2738a2bcdda4edb0e04666b64c
SHA512de7c24d1c3a59bd8123c5a2855a7fe416d5d23159eab6b1c68ab36ae786000cf7815768a0d84194c28127e9c6363e2f441b2b10aeb7f3907834139da65c868b1