Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
-
Size
6KB
-
MD5
0e9fa2fe47c3c768e3d77a421d08a3d7
-
SHA1
e3e976d7b0ad8834d3edfda2c2df9dd5ac645fa6
-
SHA256
a66f080aba6df191beb2cb88c057fafec173460d04703230e4ae6f78ece1c362
-
SHA512
8e14831a5bf73f98ae9e105f1d0aae264c33607febbfc16075650f2027d6c654020d12b5a0196eb7b22073625c09932f894fabbd3d3e2a9bf9f0f9da21f32655
-
SSDEEP
96:uzVs+ux7mTLLY1k9o84d12ef7CSTUqp/6/NcEZ7ru7f:csz7mTAYS/x4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 912 msedge.exe 912 msedge.exe 4360 msedge.exe 4360 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 2308 4360 msedge.exe 82 PID 4360 wrote to memory of 2308 4360 msedge.exe 82 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 1576 4360 msedge.exe 83 PID 4360 wrote to memory of 912 4360 msedge.exe 84 PID 4360 wrote to memory of 912 4360 msedge.exe 84 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85 PID 4360 wrote to memory of 1224 4360 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8fa446f8,0x7ffa8fa44708,0x7ffa8fa447182⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,11658396212389586826,13058627197141645114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD55b11df1f4d63494b983a1103f16f8b1a
SHA1896fc35eb70422796acb12436c5ee5d8c0842b79
SHA2565b8dd657536541429ab27526e1decad39c6ec47668e74401c746022f858508be
SHA512b16fb8c4ce4fe8a5826a4240fcf5d1d2c72e14e2745633c67ce35bc850926be98a143afb217cea582c19df4a9c7868bcacac8b88224236c69c29181148ece9a4
-
Filesize
6KB
MD51de3ce6130422b211cfac549a2f3f68b
SHA1ca7a3e174dd145a9442911bf29332eb5324de030
SHA25634b98548bb5abcd2da153420f9a4b10fc986c70bbc7bb037b947facea0b88be1
SHA512bf91b807848819af55a986a49963a18db48da8583d1f44a45eb44b4f1bd9b67335310ab997290da357e642ad0656a9acc1b248893e0646e5f03db303fd153ea3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0e8e09e4bc468ca5cdb26a53f73066a
SHA1a15f307b16f9f6451c278e1055dc425fed13a3d9
SHA256d4c3992707a5105ee3a28efaf9bf17d418464c7c13d1f1c22cbeccb1c0582f69
SHA512c40bdb06d6f094e8bbb7db937a680c25754c847b0739d3b7031796242795be51df0b124ce479c267be2e1354134baf340883e220bea0388de7af9a53fa0dee49