Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
21121177d2acb43df32eef33f866285a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21121177d2acb43df32eef33f866285a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
21121177d2acb43df32eef33f866285a_JaffaCakes118.html
-
Size
2KB
-
MD5
21121177d2acb43df32eef33f866285a
-
SHA1
083c9f9c6864d0c4bac6356c2b75f1160752d864
-
SHA256
e95d5b1d441aa8aff2031d0634f688c022f61a4b8b8fc5d7cebd8aed3eedbc3f
-
SHA512
3a77b18edce76eb447b96d3048721fcaa0dd4363382b4b13c22f0f1f1a6b787fdc5b7e7aea78b674be750f271c30ce309d51f101ae12f8c2ff673b202fcef630
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1408 msedge.exe 1408 msedge.exe 1648 identity_helper.exe 1648 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1180 1408 msedge.exe 80 PID 1408 wrote to memory of 1180 1408 msedge.exe 80 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 4264 1408 msedge.exe 81 PID 1408 wrote to memory of 1224 1408 msedge.exe 82 PID 1408 wrote to memory of 1224 1408 msedge.exe 82 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83 PID 1408 wrote to memory of 3388 1408 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21121177d2acb43df32eef33f866285a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,10358532956200472630,4158893114490651990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5146481d2348716755d1b5b1d3753f4d1
SHA17b66b28a2d562b8f2f0de9cce67b69bc91df43cd
SHA2567c5eb50344e0fa7ade700140b8d8ced7dcb00b5fbe870966f3389067d70e577c
SHA512b6468997fea08f87dc143d88206f8f70a9d39449ca2cbafb77a0f344fab3ea861b13e66ecb16aa172ab30f2eec8f55f94b83bcf097dfbecf42139dd8e37f7e66
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\204735a7-f080-45bd-988c-aa81a6a16f4b.tmp
Filesize6KB
MD5fea17c7353d62e36aa3b250485a23064
SHA10129aaa54e56af6df1f50d36a161b13c7b93412e
SHA256425e781f67cca3f8beb46e1f3b2b02348f6d6e7992f5509fdf4b83a6f2cd1045
SHA5124e40d24665218c9dbd1994773abc9f58dfe1a961895c9e95f9f735c77f465913a787b6469ee24f782157f3ce3afa50c6fce24d756522eb5b53ad2bb6e506ebe7
-
Filesize
5KB
MD514474a08bb371064a286624592ac9468
SHA108237e44d6209e036c530b2e07e062d4dcfbb68a
SHA25619e9e42d8aedd30cbf00aeba0e8d06d087f2b91b044ce35ff3bfff0e6db7a302
SHA5125b962a37e39585926dbac1b52787b3b8921d916c3188816e7027f4e447721c7d84fb9b015b7c6229df93ed3dbd1cfa3f35f7e1618f54567d28fb48ae6af83947
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389