Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
bfb4c7ffc2c196d3f92aff6481f7100a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfb4c7ffc2c196d3f92aff6481f7100a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfb4c7ffc2c196d3f92aff6481f7100a_JaffaCakes118.html
-
Size
52KB
-
MD5
bfb4c7ffc2c196d3f92aff6481f7100a
-
SHA1
2f89db7857611c99fa7b9916904a3a3c2f2a9082
-
SHA256
c3c2afb39b5b0e595bd2b5fb275b6196a08a9f83ce0287dd5269c6403f9a0dea
-
SHA512
48408f5fbfe00528e98c27a02bca129038847d3692dad32cee2d4ab3160c974b4fad6493b2f9526770bdba7bc937096dae662d9ac66477936675e77dd894fe5d
-
SSDEEP
1536:EsKqUBtTbQinOjnrNfxFVvrDZaMkvww26rGrO:EsKNxOHNZF1D02ED
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 224 msedge.exe 224 msedge.exe 1272 msedge.exe 1272 msedge.exe 3612 identity_helper.exe 3612 identity_helper.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1360 1272 msedge.exe 84 PID 1272 wrote to memory of 1360 1272 msedge.exe 84 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 3592 1272 msedge.exe 85 PID 1272 wrote to memory of 224 1272 msedge.exe 86 PID 1272 wrote to memory of 224 1272 msedge.exe 86 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87 PID 1272 wrote to memory of 2152 1272 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bfb4c7ffc2c196d3f92aff6481f7100a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebc3c46f8,0x7ffebc3c4708,0x7ffebc3c47182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11026569327064963268,18271340878050067621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5613cad924559c3e48924aa97ebbbeec0
SHA16db119cf0d16173a9bc80e3ce7547dee183cfbdd
SHA2568a6231590b75d72f7b2ece921364591679b2c3feb572f0524a34fcc89439a7aa
SHA5125d46e257c069d8e471b8ac0284a82cb9f5ebf96ff989474df4ff976835ba95e2cb313396a8a80796cd27d3e398706a7baf91a2be4e1c25e04b12e62d2af2a152
-
Filesize
6KB
MD5d8e5811b7f6bd84589822e0469f7070c
SHA1e6c6f0d30c9b6ac891085c46e3dc21dd9347ebd1
SHA2569cdfe2e542cf162a42d91e09f4c98a719fb61b04445fe44294168aa9ccd5c4db
SHA512302bc9c0bd6534b603078cc777d0d168ead717373b2a4796aa69dfb5e6571e6d2078ca6d5278e3d23ea09a95612a1b4881f50ce9678f73a7c8b6bbc5c7963060
-
Filesize
6KB
MD5667a3c38173fc9a677ca08ff2d99898a
SHA1c9c608ee7fb5c8333da4d07811180de387dcf692
SHA256210a0cb9aa37e6d426c2841e2c5899a93ea8ea7504934acfd6ff1e1baab5f642
SHA512b819e56be1cd2892ef47b40f1debc8748c841a90a393ec18d62c80d0aeadcc97c4e1a2842767fd9edc951b29a38154ab3d3e25053f5f98c6cee56dacf96a1a81
-
Filesize
698B
MD5293512cf3e3631ca39fce39cea22f287
SHA14d3373db3dfb86996109b5ef25360a463e60a13d
SHA256201d382fc0ca2e574f2783375a80e0873cc8943218158ee06c093ef11ee3dd2f
SHA512ad052f7f2ce75fc0ee2820fbae804bd54135b2bac41d3c68bd884b455069eb94b289a2dd7a3cc6518860e41d45e1339b8a18969b9e26f9e42ed50d72fe0def0e
-
Filesize
698B
MD5951a6207cf7b8b5e40b018d7b2d2075f
SHA1fb449f9e5f34f23c81a3b8fe4e855ce85f620a09
SHA25674823b1848c32d836f02b632a46da93745f733fdcba6158c3e588d5b7fb8d84f
SHA512af4bc008d9f9088458e332f0bc9b884897b3a420fd302e187a9a38876f977bed8748b36f4fd0661b94ac6e99e12b530fd54320a0de0a986609e23450d42d5547
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\dabb884c-26ec-4300-b7ae-128ee53167c1.tmp
Filesize588B
MD51af3fe50bb1b107b23ee7b1bd3c6ad4a
SHA1b7687d3252978296cc5b8c65363accca9f048e0d
SHA2567ab8550861b93ee3ce0d3e4510d98e589479663de358fea19b4a3dde7cb49268
SHA512d4bf311b54e850b89cc554666db366fb2b42864a0b18622da38f90e48d6921f5f5a24d39d5fb3a234fefde1fcb9d50e0e177dbd4629b8bd51a22f2939b62c118
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59c54e3e077ddbeb522347f39f5b77279
SHA1655720113991a60dbef388a884af50d045ac0d4e
SHA256c76b07c66c45be7e7427121019ca31bfd2cee8f6fb8608af95b438f21d69bd96
SHA5125f914a6442820c9e35bf73948e9021a20e3f71b599ddd08baf3d13d53b13991aa46ebe60d7fe451df9aec97bdb08ff99d6b70e24dd970a01ccd11e751a461a74