Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
-
Size
6KB
-
MD5
d6f37bbbcca811105572f8e1934f8c4a
-
SHA1
9d78be9318a014c0bfc0213695dba7945910371e
-
SHA256
c92ac411fd6f390b77915d7248bb66ed6ec8690c69cf5e5a3dc4c60a6e7825c1
-
SHA512
738d104944faac1ae0bd7cdac113601b1ff32244399743f7b3ce4b0dc0907a63e3e19e07bf5268ba595e41c58d372daa0e91c425ed0efc5a629cd18e5253364c
-
SSDEEP
96:SucZSE659tkYEjLiCqSNdozpJlyB19Oygw:SxSE66rqs/81w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4824 msedge.exe 4824 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4664 4824 msedge.exe 85 PID 4824 wrote to memory of 4664 4824 msedge.exe 85 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 432 4824 msedge.exe 86 PID 4824 wrote to memory of 4484 4824 msedge.exe 87 PID 4824 wrote to memory of 4484 4824 msedge.exe 87 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88 PID 4824 wrote to memory of 4744 4824 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8078f46f8,0x7ff8078f4708,0x7ff8078f47182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,674044130985487760,5562403855759256391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD544bedac2656b74ab70df2e31ca88c9a7
SHA160e1ff468ae442e32504e683d467e54bac167760
SHA256f629ca0e22e4de3e3fe6e8586e38821e3f8c94849e68ff879ee38a579d5ba1eb
SHA512cf42d9cb4f38c3144553a68224f50559f41ea6a5fd344f36af06fd93e0c2b271c4062b20b8c6cf7e207059e986a5f1111f51614311a6b9c5b77cada51dd4d885
-
Filesize
6KB
MD554e7a0fbb9b95afdd9b8ea7a74a5267f
SHA1f24fe0416fcedde7e6d777e62a3087c6ed789506
SHA256b2b413a7dec16456485b398e494229a487dff06eb5ecb1d6616aae17ea4ec5d1
SHA512824fcf14b5f47f3bce8867aaa6f3f4dbff01a6ddf5e7afc0445fcba503b3e73eee20f3508e773bfa536618b4600df35cd61854c225cb706910d849219032a53d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e1abba58b5b9cf13421c17915b66997b
SHA1c88199635dd4e50d3753a7f590e0bbbb8c7dff6a
SHA25635723de22c9a0c802de61acf4cf9551000f6ffa25f9945d1f8677f30d9f5450b
SHA512dac5e6bb732b8a78df39d1b7b6502f81654f425cbac759b4eb1fec7b43a584835d701f863c947c1b1999c8d0adf7fad83d67513e7293b92e784b820161ecefbd