Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
-
Size
20KB
-
MD5
df4ae6fd45aff606525993b61cc3b64c
-
SHA1
5484b19f1c8a0ccaa1803c61ca212848a149bf65
-
SHA256
2f9040177dc1d843d284664ce24cc71e550b00c1e8f5148292dfc2f694caf44b
-
SHA512
81c0dde962f443ae937775af4a7ac25d05a2ce94b8b63ab3342dfe8780ca5d69034839dd52d95dedb898f992e1634d95c63ae98404add86bbc69116f93c7f20e
-
SSDEEP
384:jiRKcRAa5r9DIiINfVBD8cbtjQ3RTi5O5vEu5GEdd5WScfIk9xhep8zVc9bJK:jima5r9Dsgcm3Q5EddNOIk9ewqNK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe 3760 msedge.exe 3760 msedge.exe 2108 identity_helper.exe 2108 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4116 3760 msedge.exe 83 PID 3760 wrote to memory of 4116 3760 msedge.exe 83 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 5012 3760 msedge.exe 84 PID 3760 wrote to memory of 1120 3760 msedge.exe 85 PID 3760 wrote to memory of 1120 3760 msedge.exe 85 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86 PID 3760 wrote to memory of 1156 3760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaadc546f8,0x7ffaadc54708,0x7ffaadc547182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1796,2212293935217753869,1391790414954779443,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD50c8814e722ea23fbdb2ea2c2d624ef38
SHA150f4164bd6b1132bf09b87986828c1bc3e2dba1f
SHA25693f8a45653c1b07a074456e669b5125f6e8ea2b92946aae05766d414484c145e
SHA5120b0f15bfeab6c3f6280fa7e125255052e0c2ecf393901fba6b5f4c38f901d7c2c11009c4f1e855da335718d5c43bffcd192934c48b6ef84fb7c91fbb06070e1e
-
Filesize
6KB
MD554fb1bf22d836f40ae1695982d8b5a2c
SHA1c25f6b1f48e7488b84484a03306f4dcabf4d10de
SHA2569f311e88c12548fd4ae4cf0c8a4e94560415118ee81dd8bd20c8488ec5cc315b
SHA512c2701f4d62c2572d5ab4c0a5a0f0bacfa76d67eb17959f8967faccff44db16ec31385266756f6a3e4b04523493c77e6d8768fec1755595db0f8f0c47edf1914f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a0b17ab17654a0e12133d37983b947d2
SHA1dc5c3dc5df3b207e7ad7538d70366e857dd43a52
SHA256d056e23acf74a87be24a3e1fc9a0bc2525df2ce2d26b92a2a5bd365514a3daf8
SHA5125d25e4f30d9e2e67daf020f2bbe2a9260df82ad953f5e0dd4c6b437464b18793efc3c9466f214298a92158b82b081dd4d0d1db121b7861e194c8991d6edafd21