Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
c14c94de239c32b083f1b0392f43a22f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c14c94de239c32b083f1b0392f43a22f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c14c94de239c32b083f1b0392f43a22f_JaffaCakes118.html
-
Size
53KB
-
MD5
c14c94de239c32b083f1b0392f43a22f
-
SHA1
b2848f2000c0fd82465b6df04555cfde4d9ede1a
-
SHA256
29f949e5132965c8e0f2b388d2909b5b36cdccd5f91c1ddedb91812c974f182f
-
SHA512
4b2a291e18f924ebbd5a3b546dd95b6ef98bfff040f2646a31ad25367c80191525fa782bfb9141fa66aa480ba39e362881f5359bd131781a5109c1d4bcb80622
-
SSDEEP
1536:kIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZFX5:HFXZFDqMj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 4156 msedge.exe 4156 msedge.exe 3240 identity_helper.exe 3240 identity_helper.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 1520 4156 msedge.exe 84 PID 4156 wrote to memory of 1520 4156 msedge.exe 84 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 2992 4156 msedge.exe 85 PID 4156 wrote to memory of 1204 4156 msedge.exe 86 PID 4156 wrote to memory of 1204 4156 msedge.exe 86 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87 PID 4156 wrote to memory of 4880 4156 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c14c94de239c32b083f1b0392f43a22f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb757a46f8,0x7ffb757a4708,0x7ffb757a47182⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4327016303635322520,1592880583566223846,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
308B
MD534b1e17af9fbbabe6e11367e75f659c7
SHA10e776149d717bafe2e785e757b31119f151d745c
SHA2564c3ca7f7d48dc47dd8b7b9c50d313a4966661cbba29b744f3f239a99f4fc1c54
SHA5127c06d8232943036e2470eeaf16b989db60ea6f44397fd8d0c3c90a9f6c478ae68febadb103805f08ef81064d29a325ae2c0e69cc85ca9ec5ad6818ac02bd6f10
-
Filesize
5KB
MD511cc82956ce3eaf4984c49e8ae066338
SHA138e1c020ce6b337e71aca0426d02bd33eda4754a
SHA256ff4354fa3a878f031e53f73e614d8d37e85118130e4ab0a4d06d854025cbecb6
SHA5125a2efb7bdcecba8aeb8b38318215b3c1f292ec2e2a0e34e9182ed2d988619fc8e6cac5cc3f84bd6e755447ae0b56301c5e8aa6a886f22fbdbb8b25b455eb489b
-
Filesize
6KB
MD54607981546ac86695bc821c8efc45186
SHA1ade10e2d77be1263c1b739948099515a796851ef
SHA2569a5e5fee73371af436b7db358305b5cbb82ca7af9554689331c9e3a69c7047fc
SHA512b15fd773899acf7d4896c7294f5506b07750a831b75866504fd5b8d7e2d6b3a9d76e8d2e3412628f5541c8f747eb221a3ffd971425830603b632a8dad4472ff8
-
Filesize
6KB
MD53cc79faf2cd8ce1867b809a99b1fb169
SHA11abc20c6ad02b38bfcaea766013e743241344402
SHA25691a8b11a2dd40fbde92331329c98526f2361f94cd08eb263d3eb0f053d9aaa10
SHA51267c04ea4bac0479fac0d940fbac5b414d41fcff77066a74b2a3b8c215328b710bd2702ac3ed746a16471c05855374bf6116b81b2951bae24e330b5f95f18fdaf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55c94cb1889631c2badc9bc8b783a9f59
SHA172a85c91b94c611597b11f1e59afb698a540f108
SHA256001b7ac46add34419df6a7fcb005fef3d6f121e02ef839574566723a0f82f7a6
SHA51284510227fcd2ea41d240677c4504e1fdf0af1fc4491266bf030221e82ad70fb632a73139f03d618fa13b164222ea8d219cf77e755ca0cebe9db623d3f1f441ef