Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
d5e38b694f519128a6505c8d7fd70e6b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5e38b694f519128a6505c8d7fd70e6b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e38b694f519128a6505c8d7fd70e6b_JaffaCakes118.html
-
Size
36KB
-
MD5
d5e38b694f519128a6505c8d7fd70e6b
-
SHA1
6a8b0d11777c0ac043e1ababc9f300cb0a27b34d
-
SHA256
15a63c7639c149c7dd28f34b3bd0892e6c3621ca699aebde55a1fc30a8a92e7b
-
SHA512
05cb1cfe5bc7d3a7937656d6edb81074e7f43f81a50982a045a04f496e2178b9893ba1ad252d08df85de0cee6ceebb58260ecbafdb576357ab5426836a7869cc
-
SSDEEP
768:R7mVnXBS9JyRkniEg/DiV2qOZ7FdN0dAE7F2:t2nXB8yRcyDTqOL9EZ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 4512 msedge.exe 4512 msedge.exe 2672 identity_helper.exe 2672 identity_helper.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3228 4512 msedge.exe 83 PID 4512 wrote to memory of 3228 4512 msedge.exe 83 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 4448 4512 msedge.exe 84 PID 4512 wrote to memory of 5016 4512 msedge.exe 85 PID 4512 wrote to memory of 5016 4512 msedge.exe 85 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86 PID 4512 wrote to memory of 3920 4512 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5e38b694f519128a6505c8d7fd70e6b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3ef46f8,0x7ffba3ef4708,0x7ffba3ef47182⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1888 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2420 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14919577757304499160,15940355366180654818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
497B
MD5be5e18aebc58a5227f572e32c44b005e
SHA1fd71a4eb4b4a33fc3205caf2b55b506148b7151a
SHA256e42dc727fe20cea0274f47fd94fedac8568ecdc567790cf101c1171be7c44cb9
SHA5124b0c81ac317155e2d899f46a7cf71563cf8a9d491bf9c718cd84a8694c29c52fafb3c3775179e4ce45fa07a3a8373eae3f80b04dbc4f8602297d07f30abdc102
-
Filesize
5KB
MD5eddbf722cb3d4fed6b7d0eaa5643593f
SHA1862b29989fbd9f6fb45976102afaa0438169c7cb
SHA256f415d563c2f5794684ee80ba5a35a3c71ca6e9282958ab3ada24e0bdddb24fa8
SHA512c224cb76f7e0759d1994b72a1458f2f2d888b0145bee210e1ee63272b695a8c7857d32678ac52e5fa890fd946af9327616ee5b07fe8eb4e0a39dcb65677fd060
-
Filesize
6KB
MD57f586c85f0424ed626883cab992e5f71
SHA1ea47e0e7c2628a3099c4dc6339c403d7eb675770
SHA25668965149bf657dbef39125e0b38bf3b8cf0d6d62d1b822623396ea157ceb7b60
SHA512abd9b262057228c62c77c23b55fa2ce8ac180a8968fd9c0649274410346b32762d84a6ee517bd2bb0a315880a43a0017d565646e5d14875ccc693b9eca986a13
-
Filesize
6KB
MD51acf12d874c1922bc3ef2676da9b5f14
SHA13aba7482eccc0c3d5856c5d7d14d8d595d0476aa
SHA2560845db4df812bfc8290c136bdc9fedd46f539f7a80a0057f84e4199cdafd478c
SHA512b259929f994f35654a8e0a208c98edfb1f6f421026e9e8b959cf5676780692595bae964f5be3775a1d8951394cd5ec3f3d6c9aa7068cea8e02afac31deae8260
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b67da1f0480c37850174e7fb63ea29c4
SHA1a41298eb25e6c745c8d0d67e815400d99ec8dbe2
SHA256451ce0cd23a0f16656b7697b60bfc2b10f04d2b464961fd7cb67dc16c2fd1ff5
SHA51292aadca5f0b7fce78287396ba76d788772d3a40c9c7ec2c7c0ee9b8cad3c44878c076a5c96ef3f0236e9f39eed0a9ba5a764844dcf9a7b5071cb908dead39f92