Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
5d98cdd902bcbc17c66aab5672d9c021_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d98cdd902bcbc17c66aab5672d9c021_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5d98cdd902bcbc17c66aab5672d9c021_JaffaCakes118.html
-
Size
68KB
-
MD5
5d98cdd902bcbc17c66aab5672d9c021
-
SHA1
2110ad10c309497978881fb40938ec20496c19e6
-
SHA256
0b48916a3fb9688454b6748867f800992067a050f7328e319f5f524e9b69301d
-
SHA512
bc7940c8b9b67e919081cbeaf24adbc4e452f249fc798902c7d54ae83ebf55ae06cea2d28a43b135eb2da6de401ee38e72daeae3ee864addb21490ab38bd032b
-
SSDEEP
1536:+IRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sz13e:n13I6Gp8Y5xBXV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 2296 msedge.exe 2296 msedge.exe 4896 identity_helper.exe 4896 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4668 2296 msedge.exe 84 PID 2296 wrote to memory of 4668 2296 msedge.exe 84 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 1228 2296 msedge.exe 85 PID 2296 wrote to memory of 3940 2296 msedge.exe 86 PID 2296 wrote to memory of 3940 2296 msedge.exe 86 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87 PID 2296 wrote to memory of 3256 2296 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d98cdd902bcbc17c66aab5672d9c021_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb29f46f8,0x7fffb29f4708,0x7fffb29f47182⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14929930169650206434,9906284753501801387,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0aa3970b-a47a-4ce1-ba48-2b95e8f86de9.tmp
Filesize6KB
MD52291cf76a581161e94a23c25db56803b
SHA1905a66ba22630625ca9b3ab1b804e7519fc3dd43
SHA256ed9a5505871a04d7478069f3d82a61419bf9c051e9dbd6cd13942f283eab6572
SHA5128c825d74da26fca5dba16f76b50c20a4dae55c8623896668ea3a689447d0320383defa83711730b8bb1bbc476bcf82768a4c4f907b7841018259f77a00bd81f2
-
Filesize
379B
MD519ef86be1705a73c4ebc8f23f0d65e33
SHA17aad65656a5c4d17def995bd542377506b4ae54b
SHA25628967e5a7af74877d1e881cde2b281d059b3bfab7a6e2a4b8a420cb4bee876fa
SHA512989f486a5ec5c28d3b9bcedd081e2459b72273941bf1593cf5820b1485f4d5444167a128be40394979751a3788004b53a0c2c283fbfddce54f3f9a935394660c
-
Filesize
6KB
MD5f050d8757d2a699440ffaea022c6737a
SHA17e8ecb61c6f84b8be8cbd7d119c15b4d3de95eeb
SHA256bf944a16a5fce7af3483f4a997d2c955bca8e515fb46df98f3a8a771654756b4
SHA512191eb7d5f12f59f3e6a5e32cb84f0779f63eee623dcd137924a888c5755f118685193a21a36bfc83cfbaf3d97d870dc228f29fa526f05441d680efb49c247307
-
Filesize
5KB
MD5f59f15b4e40789bc1bd551882afbf699
SHA11b48c7da8bbd78f08388f0804394fe756839b658
SHA256b20205249a658248c11b14acd9ce230d2a1326fea775587c1ade21a8bc8fe7ae
SHA5127b34f83e5261d6c024b65d015985f9bd8cf1f3b4dff4e01c211ea915562a01ab4631f8d074acc7f799f6272b1475718054a9839c7330ca4f1e146d485ac43702
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD555818c5762db2c699be4e72e6861d5c0
SHA1824852d7c601bd52d394624d540d7518f8e0a0d5
SHA2567a6d637ba46810e382e3bdad66da8121b65e34c600df886daaa5d5bad8cf132d
SHA5128eebc5a70ebf065ef59c38d69a5d630b8831b33a14316a13bc913c990ee0188a2c5221cd34f138f50427b97cd50060d5c24b45f6bca2c6282c660d5155626b39