Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
-
Size
21KB
-
MD5
cec34aca569ca0b2a488495b577674a3
-
SHA1
8d675137e3755a23087a747ed631fe11fa3fb873
-
SHA256
a9af95336126faaf0bd2b9717e044eb16c0ccc75fda19311eb36b3c66cd77e0d
-
SHA512
d9de388a25f8e070b44ce667d7c3c1a3cacadca2884bc57047dffc08e63b5fb9aff82595b8bc1ac6010c858a4b9a9aaabf7135f0b36d11a49c016e75cf6cbdb5
-
SSDEEP
384:/eBNv5Dg7fDmxJAR7AHAi7mQocqhLSKXH5yOH+nPjSGTm3NOduxnNcvrxW/nWtfz:/eBNlg7fDmKi9s5y4S63NzEuUrjaiVXv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 700 msedge.exe 700 msedge.exe 1980 msedge.exe 1980 msedge.exe 4228 identity_helper.exe 4228 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3848 1980 msedge.exe 83 PID 1980 wrote to memory of 3848 1980 msedge.exe 83 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 3376 1980 msedge.exe 84 PID 1980 wrote to memory of 700 1980 msedge.exe 85 PID 1980 wrote to memory of 700 1980 msedge.exe 85 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86 PID 1980 wrote to memory of 3432 1980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffbd45c46f8,0x7ffbd45c4708,0x7ffbd45c47182⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,15481597495171683517,15882722404155220721,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
259B
MD5d4b641a2d6d48c68da9802f6e56678d5
SHA1aa34afc602c079f32a2f9d28c1bfc6d25cfb0d6b
SHA2565875a0e0471e56ff719bdb8633a51744c19b5ccc0013492edf32aee8ef3499b8
SHA512d80721759911524a42a8201be73cf7efeb66b8b385eee51aad8aceeed0628fa83c25ebaf17e28c74bcd87e7c1cfcefff15b6762f5ec24adbfdcdf5f236eb89ce
-
Filesize
5KB
MD51222a691635c3cba6fbd941ef23f63a8
SHA19fe2f8d751487e057678417371ab97faf74fcdb8
SHA256719ef182e1d7cd48fe79ec71823a8e20a4bd4495ff656fb7a69d46f129069d9e
SHA512545d2b232644f2f3c4b512d267e3add1c27645cdcd1c4339ac6d213cd69a8fe053e732f7d33fc30b08387838aa1bb95ad169b5007b42f6807c887d8f0b6a66f8
-
Filesize
6KB
MD50555917e1862d24ea4d356101b3ed63b
SHA117c5665ad414dc3ec684cb7a2c7b8b4fb3b9a85c
SHA256f69c6b7f1cf513bf3df7f2fe89c276fc4f7c5d68cf001d824946487898a2d891
SHA5122489faa4cd717ceb68911e2c8b2b679e707643d68c56c9df766e664017f0cb54b1a5a5391fd6a9e35d4f9f8ed8a691c00e217ac5c4194ec4190f3d64b65c1843
-
Filesize
6KB
MD581d7cca99614302f07b67f12998d0c51
SHA1a25f11cfdf1197c55343e421e1093638902b0e28
SHA256384f205587cf8321f545a6258d9b5be6a2aa152427891b6af22c75ab5259f87e
SHA512e6af770e98052a4d3a994d286c5b3ab214b00b78bba839623b357eebbdf05c3374c44fe20d66965f34ef2446c2285e603aaf4990103bef3818d3ded4484bd714
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc37f75507255c0e211e045ca0671483
SHA1b431df59a9ea1e1dc0fe007c723bbcc58ae8e7db
SHA25698970797458d09d72284e204e12b3bcf4afb6f307ffb9c72ce912d5c4129b09f
SHA512648567c29fce1c260b10d4f495b8eaff3688b730e9918834017c4267e8804402a639cbe9c070bbf77d2325df21a79c67dc2c046f445bff77eaa9d90d2108e064