Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
-
Size
53KB
-
MD5
2ce16c7bb2b16027748c86ce902943c6
-
SHA1
52b899033fff5946eae30f1a91d6ff63e0d81479
-
SHA256
c86e489937381818b1de84f52ea79eb19c64a97f4e3c8fc6efc53a452582dfe6
-
SHA512
9352f1c4955fe2ad018e65ae256e691b91220cc7464ba14e84a5ccd416c86e55517ea07b5785a0702202fec8376432d6dd4003333d8d7256d3017135a3a86011
-
SSDEEP
1536:CkgUiIakTqGivi+PyUerunlYG63Nj+q5VyvR0w2AzTICbbWoz/t9M/dNwIUTDmD9:CkgUiIakTqGivi+PyUerunlYG63Nj+q5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 5008 msedge.exe 5008 msedge.exe 2024 identity_helper.exe 2024 identity_helper.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4408 5008 msedge.exe 82 PID 5008 wrote to memory of 4408 5008 msedge.exe 82 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 1508 5008 msedge.exe 83 PID 5008 wrote to memory of 4268 5008 msedge.exe 84 PID 5008 wrote to memory of 4268 5008 msedge.exe 84 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85 PID 5008 wrote to memory of 4724 5008 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe7ed46f8,0x7fffe7ed4708,0x7fffe7ed47182⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12666102734168377402,3590392448246893814,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e81c757cdb64c4fd5c91e6ade1a16308
SHA119dc7ff5e8551a2b08874131d962b697bb84ad9b
SHA25682141d451d07bdb68991f33c59129214dd6d3d10158aeb7a1dc81efbc5fb12b3
SHA512ba8de0b3b04fec5a96d361459dde0941b1b70f5be231fdec94806efa3ecf1e8faf8e27b1800fa606dc4a82e29d4cf5109b94109e5ad242ddf9f4671e2acbcfbd
-
Filesize
152B
MD52e57ec8bd99545e47a55d581964d0549
SHA1bd7055ea7df7696298a94dedfc91136e3b530db8
SHA256a50ba35608edc2f3360cc71be0d4b29bba0e3382d1f08f24df5322ce2ad2443c
SHA5126b9b73d983c472149629c842e16e4f7c2f8a0a3bb6dd64837ef647db810ef1beb3a02b15dc1eec2c5de8aee6b3ca195c7d26c432705061c5b0ec7841a5bbf106
-
Filesize
402B
MD501aea0b175e768f3124cc8418ee5ed4a
SHA170d25afc3626352e4356a758c6240fd71e0379e3
SHA256a2de401a8ff40e4b88a29dfce8245ed8c01479db9bb4f8e4c6281224a5e9388f
SHA5120148ebed0610b0deb93ba7b1090cd934cc2f5738b1e5ee8ad93e1fceafec6d7b3d4a9959d35ac7f90c8964a41d68999320d3f6cc2de4ae0214aeb6a5e98c7aa6
-
Filesize
6KB
MD5ec8ade2056055257fb6c7b5c79392cd4
SHA1d1aa9bcf1d081de63e1d09e0282c3fb8a7e9285d
SHA256798b597422ec5533fe5b67c242b193fa8462cac799c717d1494c840b8b964c50
SHA51219339927423eafeb3088271cf6088d940349574e9f67fa597f6d870da34f0885ade28437a9cc9f8823b04d861aed499400e55f5dd2d7c6050bf283f2e3261cb1
-
Filesize
6KB
MD5831f7955ad3295444df9b049a6fbb946
SHA1e1ea0f406198cc93fa5fa01166dc66ffc4745617
SHA25691005f8c64c6f25eff857288255e29dcac0511a91191624494db060ced046ba7
SHA512b78fb7846d9901cd00cec8c23fd20e3a5e014c531c71298f2f5bca6aa425e70af7910717c789cecfa12e2889cb901e12a1220bdf19e4762f6232ab34cf335451
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5129cad1ebc8256c095e12c24374dc4e5
SHA116213d797e8f6e65a2a41ddde97ced33655c3fa4
SHA256517500f1d2ce708c53039358de870bdde1e6ff1b2790f5dc946021bb2e75a246
SHA512096a1a429d7eb24ffccc98a006ca468ca49398804805a419b80357503943f67b2459dccd91161d0b96b41b37cbf334571759f8b6e225827793594f53847f69a3