Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
d195b86dd1af0f9dc077e2157a8aa2d2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d195b86dd1af0f9dc077e2157a8aa2d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d195b86dd1af0f9dc077e2157a8aa2d2_JaffaCakes118.html
-
Size
122KB
-
MD5
d195b86dd1af0f9dc077e2157a8aa2d2
-
SHA1
eda49c9e7f55c48260ba364fdf711109a7ad5af9
-
SHA256
4f183f0118a286b3e1191c5d2cbdfd14a8b1ac640ea4be169dec44a7d97fd85e
-
SHA512
fd16d2d517ac563b919e15410ed94e185ba5b520f66619b06d1203321b795f30dc986e1954ed84c32fe2c865b66b49817c7a43c91326174e478f1a301e4ceeae
-
SSDEEP
1536:P08pxZuquZuqQZuq4QqjIVpToXvHP0qDX7c:P0GmHP0X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 2828 msedge.exe 2828 msedge.exe 3492 identity_helper.exe 3492 identity_helper.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1260 2828 msedge.exe 83 PID 2828 wrote to memory of 1260 2828 msedge.exe 83 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4720 2828 msedge.exe 84 PID 2828 wrote to memory of 4080 2828 msedge.exe 85 PID 2828 wrote to memory of 4080 2828 msedge.exe 85 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86 PID 2828 wrote to memory of 1428 2828 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d195b86dd1af0f9dc077e2157a8aa2d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffead0b46f8,0x7ffead0b4708,0x7ffead0b47182⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2529990664211175481,4490779661093395264,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
256B
MD5507f52dbd39e55d2ec45861fc3398817
SHA10b65de716facce64cc063d8ef3afb7cc45c7e2ad
SHA2562d074659fe8c2129fe68fe02284eb53762d056ec558aee61ae55ea3c76996d09
SHA512e41d53688cc18dfc5eec6142604faf5a7734e20edf432b774f5fddb4b971d01540966b38c4a159e6971736a66445552d4619acbbccd9cc3e9e03c7023f75f9bb
-
Filesize
6KB
MD5fbb0862b4aefea4a459cfabce69d5b98
SHA19e4b66b9b2a9be29abec6af5d6ae6fc8464777ae
SHA2565e24e8607d020b921bfb6f4ca918e92106c1e035f3e26927b8358181b6bc0c4b
SHA51214463f945a52d9e1c6da382043361a0b9417da5fd30bb96cd7ef1762c3f7a463271ea9b14c36d39936a4ae42d4bba47fd6b234f32616ae11b1bbb0271eb2cd3f
-
Filesize
5KB
MD59cd056896d53b5d57be2bcb16ffcf382
SHA18dc60159392fdb760a5e8db48efc2880c8038090
SHA256202e20857928ec8102fc9eb74c2e1c1dffd25e68f300229de3c147deaa436824
SHA5127227f4d0d9526b3fa322bc1aa1c9ce54e394ab8bcb53374cd56a2cee19ac8838758b484a16aded237771cf469475369ebf427db43cd5c44667c4c7d39f9848cc
-
Filesize
6KB
MD5802354ad95c51d8ece5ef1c507470bc6
SHA16c7fe99d29ffcc0f69e8112cd9aaaec3652572f9
SHA256db7d30b22969804255766d79e19f81c05593b2bfb8c4c49c7c525eaa6a3abb27
SHA5128047870284c482f483fb2c2df5d5b5702de0f3b16e0f6d5c08270667855a94327a152e8746c09a9bf812ea5ddb3c7b89d20bacfbf06e5d8ddf4d6e777261238a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58d8c4a7ffb1cd75dcd36dff4e58e3441
SHA16cfed23196462dc04d8b2801598efdbd053166b8
SHA256153d0a53635c046643437263866b270ca5cec5f681116799811fa94438c4e7ad
SHA5120d9102d562ba5337aab4b7f902fd5c943ac388e3a47a2e001fb6250fc312ff71ef1fb4908899c97ef5e82668410c10b5146cccea6ba276d2276b8d8aac5e2e7d