Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
b66dfeb029b7d2e978ce4a0e4ea1af42_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b66dfeb029b7d2e978ce4a0e4ea1af42_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b66dfeb029b7d2e978ce4a0e4ea1af42_JaffaCakes118.html
-
Size
2.7MB
-
MD5
b66dfeb029b7d2e978ce4a0e4ea1af42
-
SHA1
e17557cf4096de0188b65153e00c44cbffcafea8
-
SHA256
803600ce186f7d496116c771af43682c891e8cad65204b2ae266692d475c0e74
-
SHA512
64c6554deadd8b09bd6177b64d3b8fc81f0c2730829b393b6832638a277be56efca0d85790f473b03b8377e863c163ef05c370d0c7e1fd495d7936a4aca2a861
-
SSDEEP
24576:o+aDHsl+aDHsE+aDHsY+aDHsE+aDHsv+aDHs1:z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 4928 msedge.exe 4928 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1016 4928 msedge.exe 82 PID 4928 wrote to memory of 1016 4928 msedge.exe 82 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 2064 4928 msedge.exe 83 PID 4928 wrote to memory of 1492 4928 msedge.exe 84 PID 4928 wrote to memory of 1492 4928 msedge.exe 84 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85 PID 4928 wrote to memory of 1960 4928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b66dfeb029b7d2e978ce4a0e4ea1af42_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb750746f8,0x7ffb75074708,0x7ffb750747182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7761300244921127780,9767147327414255411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
6KB
MD5b785463af29d6949431b908bf07eb22f
SHA155e63bbb2b8080e20c78c63578ce2d4c33280863
SHA2566dbdfb092b00994b24662cace8ef65f89912c764061cc0a3260e02f177b95918
SHA512cba49f234c1cefb01771cc5994eea5edaee42c7c9ff4c408309b585f4c7ea2adfd8b33e3686ac6d101889be1cc11c7683b29f7143e30f12967350ed36f3f5405
-
Filesize
6KB
MD580edb614d92f66fb905afac9152565ba
SHA1f77634699166f5cd093ff7fb7157e84cc7691f0d
SHA2563a2af9f9215facc43d0ece5b1f6ab99fbb3c65d0961e40a004a839a61ef74aa8
SHA5125401353aa67d581510076907ca6a5fbe6ad03b33ca6e65ac81e18828e130abc303a76a9103d7004b614560e5281371bfa81c83b91a59a642339fe0b4a6b5b624
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e4535a5399a4f888cef7a1e3f7f64349
SHA134c6d9084289ade519cfc27dd9548f27bc20a088
SHA2568f3b08714683b854bcd46ca70cc17f689499ffcfd6afae1b758d44e365d5ed98
SHA51268e881d93401befe61f4fd43b1b41d38f68cc701f6f45c469268298196c07802eb7df9db0ca5d2e674e4f8120fabfc623f65ee4f0119e7979458e948b5edd5db