Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
68698d694d1fcdb43c5b155b9dafe120_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
68698d694d1fcdb43c5b155b9dafe120_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
68698d694d1fcdb43c5b155b9dafe120_JaffaCakes118.html
-
Size
168KB
-
MD5
68698d694d1fcdb43c5b155b9dafe120
-
SHA1
807ec18bb3263d1405e30c9e9974d2d756cad47a
-
SHA256
58b80edaa8e36789e98ffdd2643717b754aa2141ddeee4cec189f87138219436
-
SHA512
7fc98a6a98b8d6142b868e34d3dc49e594da6a90d74fcfe6279b274091c102b70653a26b9fada6407c0ec0c2a6fda5f70cd54b5068ffc9cb228ef54987a0a320
-
SSDEEP
1536:8D3O9PcUBgGIsBgIORdBgZhQBgkFDHBgRraKBg73ireBgSBvXk6WBzC9G:b9XBgYBghBgoBgWBgVBgGreBgsSBzC9G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 2196 msedge.exe 2196 msedge.exe 4700 identity_helper.exe 4700 identity_helper.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 5028 2196 msedge.exe 85 PID 2196 wrote to memory of 5028 2196 msedge.exe 85 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 2472 2196 msedge.exe 86 PID 2196 wrote to memory of 4108 2196 msedge.exe 87 PID 2196 wrote to memory of 4108 2196 msedge.exe 87 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88 PID 2196 wrote to memory of 1212 2196 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68698d694d1fcdb43c5b155b9dafe120_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff314746f8,0x7fff31474708,0x7fff314747182⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2868574456652339716,15974583869081970920,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
550B
MD5c34b048eb3524876498885cc5616658c
SHA1e2a75e88e9d16096ecee1dfb5a3430cb33f441d6
SHA2566ca5ed18e7c69ac1cb2f8909f71632058e7bef9b17a1f767e813e28f0649c248
SHA51257c7b8082f43eeb888474e5ebfd7f749ecfc7a861725fe3f87791f963b133c2320679222d837fdfb301fcc0df558d01440268f4b8953091f430c731e1472a11d
-
Filesize
5KB
MD57efe4dde43e106c08ba7485d0a5fe96e
SHA1924d95b27161e531610d35749eb40bd8da622403
SHA256e842461290b6bcf6caaad4328ae8db075d27c0953c1dd23e1609d53c3e025427
SHA512f8986571529615d54df39a1f19fe84856a3d959d45a7f088595f0bad2e0751af1f9187aed795749b660bca91f91edbb89c2e614e1ea883ce83572d8151f1391f
-
Filesize
6KB
MD5087e8dee8bee6dec2d22d3b3b9577ac0
SHA14a20b1660f0f20ddc5bd4b99853b2ffe28c20f3e
SHA2564cb039309ff6f498b2c7825b01e533c4529e3f4bb11f029517995e2f41eebf8e
SHA512d9f3f32bb1c619c0bb2f8b605892c5707106c1f9899d06a462c4934fdfaf8a332b3d2858686bab7a2ce26492176657e39e6f10f72a1ace7070d95ef6142ef683
-
Filesize
6KB
MD5fe8c99160a24588445f00d70c54211a3
SHA13b37a405f58090db77ac6fc357d397d7e8bc5d38
SHA2568567e64d87f5d28599b6cb3a6073c09b626c6810cbfad1b7242128486b00c082
SHA5121600488247c66d0198dc67701e686bd55c250db0d2fabd8871f2710f3ee29d256cc69b8cf292e08a6f773b579786974091b611a17ca8d7aeea7cbd655760ed5e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5caba310ebb9dbd04baa0eed2e51d30a8
SHA17780873af023937756052c109bf9953718500971
SHA2560a3dcedbc9490bab6d303cf7f3d83fffa751011b2c0debde0fb93163941955e8
SHA512089935fa4e765a4aeb19796f338cce7253490c98eb28c641026ba464f59cac72d892b24ebdc30acf0e1d849d18f0cc94b0028a251f8b9412c00d61e8a9fbf2e1