Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html
-
Size
53KB
-
MD5
28815c33fceab37e841aeb2cf300b6f0
-
SHA1
d94e0816de15b74ccc66ac99dad667fec8509907
-
SHA256
c51423d2282aace4d3205cb0d32972d3e5ac83a11104c7f876570bc44a67a83c
-
SHA512
b7d3e067732c2d85d3c16ab2b850fa0572378d3bc2ce1731d3379bd4943af665cd1affd7689be1c5bb4f3bca2ad3f59cb30dfe6e24bf94efa72949cc35314797
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYm63Nj+q5VyvR0w2AzTICbb0of/t9M/dNwIUEDmDf:CkgUiIakTqGivi+PyUXrunlYm63Nj+qw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4684 msedge.exe 4684 msedge.exe 1736 identity_helper.exe 1736 identity_helper.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2364 4684 msedge.exe 82 PID 4684 wrote to memory of 2364 4684 msedge.exe 82 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 5096 4684 msedge.exe 83 PID 4684 wrote to memory of 4952 4684 msedge.exe 84 PID 4684 wrote to memory of 4952 4684 msedge.exe 84 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85 PID 4684 wrote to memory of 2956 4684 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28815c33fceab37e841aeb2cf300b6f0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcecbc46f8,0x7ffcecbc4708,0x7ffcecbc47182⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14718217505920143317,165154317576877022,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
403B
MD56e5c3058282af076d2352a7c2ed9dec7
SHA1ca8c58b45e374d6ae73ad83e562c642ed3263563
SHA256aff2aa26a5cc2e025c498d5937460e815e41d6c22becb042b22f3cf250677f53
SHA512a78be3be90c1772a9ab4c321f1363edb162f55a4d3e2f4a09114305cb7a74b775e9c0bdd993c2c642d0281c4194dd83aea483aee35ad707976fba4969db6eac2
-
Filesize
6KB
MD5e3306c28dccf83f9fde671b5f686c6c6
SHA1cd1d18b5fa92c41a9c95c570c6215fcbea48df0c
SHA256f88259ef58330edaa5552e612866a2e07cf19ae33c09493552c4f19094c5aedf
SHA512dcc648cf376422bf2d42fe880e2865c0b9f0e481a469de5732ec16ae3da55cdcf81cd32f35e913c19983a1acc4c5865d31fcea5d7f8320dbad91f9dbb9c2be1c
-
Filesize
6KB
MD5e5e8d0d771d588ffe683f15cc1d5c8d0
SHA106630f12e95ff8631e2b6f251fb51105c13a0a88
SHA2567bdf23c528ff95b7a42c9dc76ac6ee6149447bc7efc491970c12ae35fca200d8
SHA512c2ede2c17e9e75d648ca508019f32e85a0bc3449e9e535a421dd001f27d3ff0c3cd757c6c00e4d40fbc79ebaebd8294b77abefb13884138de4d21e1ccb89b4bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51579637d02516da29e450afb5471040c
SHA1745adf1d010efa47a808cc7a56c559ae2ef1ebca
SHA256b9c08b73ceada265aff0972659c02dd2c891de84a40c801a5214ed87830d2efe
SHA51265ca223204c63c4432155ac7317744771f20f6ff5ec647b303968ef269ba3455c474c06f85b91b27d14d269d0c6f11e71fca6336241d6042418e77245b70c0f8