Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
05ed8e004e290302698ff6bf1a4db3b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05ed8e004e290302698ff6bf1a4db3b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05ed8e004e290302698ff6bf1a4db3b6_JaffaCakes118.html
-
Size
213KB
-
MD5
05ed8e004e290302698ff6bf1a4db3b6
-
SHA1
d145de443e77e65fda12cc80caf9c85049c0ba18
-
SHA256
baf4dc892ce9b6309cf957b932803570bdaf4765bd70442f7aac5248e211e509
-
SHA512
f32ba3a98b76e2daf4aba39a756065735b7ae51b3d6113cf09256b4837d614e650c44e2817c81e9c110e8b7baf0e5e634ace26a8cecf21d539cc287de2a7675d
-
SSDEEP
3072:9rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJg:Bz9VxLY7iAVLTBQJlg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3400 msedge.exe 3400 msedge.exe 2596 identity_helper.exe 2596 identity_helper.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4952 3400 msedge.exe 82 PID 3400 wrote to memory of 4952 3400 msedge.exe 82 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 4320 3400 msedge.exe 83 PID 3400 wrote to memory of 3508 3400 msedge.exe 84 PID 3400 wrote to memory of 3508 3400 msedge.exe 84 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85 PID 3400 wrote to memory of 1040 3400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\05ed8e004e290302698ff6bf1a4db3b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6889665280784812919,13161983766320515070,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD5b0a9dfb50cf52952b32759bb1919db1a
SHA18ab81b020cfeaeefd99a62bbf51126d3996007ce
SHA256c99d36cbee990e7a917e4cad581f798f81947a27fcb56b68036f27830a36f9bc
SHA5127865c5bf9fe57d870ecf5b2476a4b25e297e3e4c2caa684717a3346c75a036ad76eec9dbaddbe33c8f9fa138130663c5caa15ed43528b8f990f9fa788f421f96
-
Filesize
6KB
MD57f2c682e241cabff5b5841f1b467e64a
SHA1527625f5a8039f30a060dbc7d77c7d976e9e2968
SHA256a586d02a37e31f7b20b1179eed71d5241b5ad987be09ab59950bec56e6e68e6d
SHA512ee5c4e07aa0e71366518ae016645a9b1cf9e6f7ca3bd1a58b2e8c1f5f7f8ae09a5ac679bfb704b48333d04cd15e0e60820f0b4c28bf079543d4ca2d473fb1fd5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD553ca05cb3a5a3d48dfb682322dd2395d
SHA15add21b7a4cb0574a7311758e2c8f7f7383f36f1
SHA25688138b36214e1ba83a9566d8956617eb139f76549b37759b8a561f66978f7d49
SHA51263a4cef3a4fb43752c3af8be9085f1edfa887ff348c72adbd33fc7422b82f44f16c96fcc237a360ef832b1686fe1033182f3b17f3aa9b07367b35fcb82860d84