Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
dc70ded5150495c96026a0cc8a4a23e4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc70ded5150495c96026a0cc8a4a23e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc70ded5150495c96026a0cc8a4a23e4_JaffaCakes118.html
-
Size
2KB
-
MD5
dc70ded5150495c96026a0cc8a4a23e4
-
SHA1
31167583959d85c5146e971f4fb701d828da0887
-
SHA256
6beed34d503069052df9b69a53213de426288714fb291f46dda5e6f969dda6b6
-
SHA512
5eb45229c1196c5868e8f88ea14a05d4665a4c0f54b3301e081583309296879b7a5b6bf52927188748c167a9f31e88d49d50380424d549bedbd0b7ffac64527a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1532 msedge.exe 1532 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2324 1532 msedge.exe 83 PID 1532 wrote to memory of 2324 1532 msedge.exe 83 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 2368 1532 msedge.exe 85 PID 1532 wrote to memory of 1516 1532 msedge.exe 86 PID 1532 wrote to memory of 1516 1532 msedge.exe 86 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87 PID 1532 wrote to memory of 1324 1532 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc70ded5150495c96026a0cc8a4a23e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb53e546f8,0x7ffb53e54708,0x7ffb53e547182⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4188642598641627772,15703630484960099729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD58fdb75b374c71d53c3ac3b765fb9cf83
SHA1a4da415bf681dc08379ecd9ead23ca15989a9fad
SHA2562b40ca54b65f545a23d08ac114b0b58c6c9120a77fac112595abfa86306f09fb
SHA512c432064aa0ede4e2245458d013f154690a8b6065220242cb2ce1e12a87bd19a18021800d2d6c390da17a24b5fe7e7489f909a4c507d1a65ac11fc7e7f2828ebd
-
Filesize
6KB
MD56b646ab19e74cd4c5ed1c5de51b2449a
SHA199b612dd1da8976178e70568d41296a28c1065ca
SHA2565d3c6c5fdf3f2956b2b2cf2c77467f8c86d23539a2ccf832f160c7434c218329
SHA512a33eb1813e49ba2c0c7c168a48d760e0dc7ba73632f5cc6fbbcd1c254710ad17131cbbc9de999b1f02ac4adf36207d11841e03d36fff1019a2f13660d2cad4fa
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e6bd8ec7a974d1dd86ebeb135b475eba
SHA1ef7179f02fa9281dd4c7119feb82d8697f2e27ea
SHA256f918d8391e21a5ddb037e35a0a1779ce123441b097093c0df386c33a9af98d27
SHA512d472cdc22d312031fecd60594b0e230f2cc96ecf10936d74c04494d144a024b17ae4b397a538307ced348bbe2f2311b4882aa7f7b75ea283dd0e814f46cc5153