Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
169181d338905ad95abb6163eec1871c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
169181d338905ad95abb6163eec1871c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
169181d338905ad95abb6163eec1871c_JaffaCakes118.html
-
Size
36KB
-
MD5
169181d338905ad95abb6163eec1871c
-
SHA1
70b628e4440e9a8e925d9798f1fa1e3a90dfe9db
-
SHA256
ea227e0a1b37a4c51c2ef8ea0913abdd0ad7d7beb1540b6fb00d27747979a53b
-
SHA512
71204e12d295308cc513514f7e419021bc7ba9de9c52723363ce1b5b61065a38c217f47719028e67ac8f357439b95a113778130c8829c43a9ed514742fc83a5b
-
SSDEEP
384:g8FCtoIAEJ/DafUj+x7hRqouP0X0iLdXw3wtO0OojOkbN/3HPzKVPYSiI4Z/+NJX:g3MOy9FuP4Tyms7Hap9mWy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 2676 msedge.exe 2676 msedge.exe 988 identity_helper.exe 988 identity_helper.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 852 2676 msedge.exe 84 PID 2676 wrote to memory of 852 2676 msedge.exe 84 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 2280 2676 msedge.exe 85 PID 2676 wrote to memory of 1664 2676 msedge.exe 86 PID 2676 wrote to memory of 1664 2676 msedge.exe 86 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87 PID 2676 wrote to memory of 4464 2676 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\169181d338905ad95abb6163eec1871c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc75d46f8,0x7ffbc75d4708,0x7ffbc75d47182⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8101281029795692361,16817304880407682389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
715B
MD5630a9603fa24d3a5b6fb9c1a70c59f86
SHA1a60b9fc027a1afeb0b5bf093682b37a485af0592
SHA256901086f6abb38251ac30946dd0eadd86651063b2b856f0f32b47ff091026b51a
SHA5129ac40d246cb9950f65778852ddce0b3b13a5bc2180f307750338d7c7f577f256e49f5a536322276b56d6c2769339ac9f20ce3adc0cb9227cbbe0a880f2ba7726
-
Filesize
5KB
MD5d291d5748c50ba0946e0c485ee311b2b
SHA1913598248ab86de1de0759224663dec90da50828
SHA25651f02d85422a5dc53fd0bfc384a1a62d27a8fe6def46f614d080de5851116469
SHA5123d8b069d346365e6c1601e64cc0bbb7383eea0c9e6881740be922ee4e7c46eb1d7d75fdec10e8fecd86f4a03188f540e0ff80425bb686a4f5666c142f7b44cd7
-
Filesize
6KB
MD564cd019d8bde8b48ab1158274c7098e7
SHA1be33bb465f1b97183a84dbbadf03e248192ce9ab
SHA256395f11087a33520f30a66d43567c5ed3302c5d1b7bc0737fcfa3181bdc1b9ad4
SHA512fdf95b149da8a9e3bcb56146a512101b29d3ba8dd2350e044eda41985f1567fcb30bd0442b3a193f2e712da1f047e1b51bf7557e6bb1822322f3a9390dd873d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cb2dcd0eb03e9f8e67fdd0f1075fe1f5
SHA135c6a34b7f5fdb4ac1f33788c12c0f380432c7d8
SHA256b4c33af21a1148d0504a17e19b46071a80abe74204d15186ce9eadb45965d106
SHA5126f1f76b79cb833ed2866f515828276e06c72a8d95856cd1ee0de84dde1cde2d85298cd97e894f33e1f281b768f24bdcf7b4c98a40fe519ad05eafe3d58471a57