Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
-
Size
19KB
-
MD5
122b725cf6562d99eb2685e4ac580c78
-
SHA1
80308671687edb95d02cd6163488b3b86ff77673
-
SHA256
dc0149d8e383b4ebc705a8a8fe860f604b93eecb50bf3f18eae4df108eb21dd7
-
SHA512
bf9ce124115012583a5fb6ee2391f3b6b6147d8f1925ef405041be8f49ab32e15ff6789f7bd90da5e409586aad33298d21e87b6ff28cd41130fb24343968aae6
-
SSDEEP
384:4dlDCJpWeSFSEuvFkk8diITJkbpv0a6qgAhvu9:uDCJpWeSFSE+kk8dYpv0a6qgAhvi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 1540 msedge.exe 1540 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4500 1540 msedge.exe 82 PID 1540 wrote to memory of 4500 1540 msedge.exe 82 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 3212 1540 msedge.exe 83 PID 1540 wrote to memory of 4728 1540 msedge.exe 84 PID 1540 wrote to memory of 4728 1540 msedge.exe 84 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85 PID 1540 wrote to memory of 2492 1540 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6a6246f8,0x7ffc6a624708,0x7ffc6a6247182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18087630236329353192,5686800016493370627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3bb80256-11d9-4d6a-9c27-bb4acd1147ac.tmp
Filesize5KB
MD508e641d56cff22cc42dca7a1fe4074c6
SHA14fb36b08818fb1106f7ffa462b6eabb1d6b721e0
SHA2563429a905fcac022061240b73284c2ca037347f62dd4d30786f072abd667c0bc5
SHA5123e2ae4d197c7ea5e1652698e4a7744a9bbabf856be97e0783520af35454649f7f80dec5e7e647ab92dd27b2222bfbd8beadd6af67d572313fafa11fb9d663b52
-
Filesize
6KB
MD5954adfe3aed2e9c3bd3db81491e9e96d
SHA1d9f0aff8f2e65827d598dfb543591fa6483c5dbd
SHA25624f4e40879fe29d35b6c3bd6965b72e30c7d510d19473390abe1307a6d604739
SHA5127d8f6e3d35d4c18f483af52ae562924ec7a2c4de026a4daffee2fddf30b62ccd9943243d7df3cb8005ed1b6d561d195b85882feeb74f1d2dd998341f18b43d62
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dc203fd51c1804cc07d5b451b8d6f75a
SHA1d1cbeae8a2d88f0dee2375ddcd92362a3515daa4
SHA256a8cbbb75646ef431d09e99896b918774c52a7b536f03aca6ba25e4bc5c115805
SHA5124c666b61d6535118f8d886c6204595bb844317cf3ac7d672995693fcdd90c8ef3608fbfd1a9eb009830256e87a99d91462321101b4ecd6b121fcd5bcb3275f3c