Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
eb2ff04559282b873bee5e6665acf4b5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb2ff04559282b873bee5e6665acf4b5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eb2ff04559282b873bee5e6665acf4b5_JaffaCakes118.html
-
Size
76KB
-
MD5
eb2ff04559282b873bee5e6665acf4b5
-
SHA1
d5874289ca074422d9a678d65e9d42a6fcf38867
-
SHA256
53bb3d2d4bb8bd5e0512c80b82fe68e8da5464f35aee556140203d43c617a9b4
-
SHA512
47c715f7bfedfa131c163c1e6b171f0381af2504300d7c9a393916162e038021ba715aa03d19431b8e833d115b2b2f4636e1fd204cda47170926a1c505a9bc1f
-
SSDEEP
768:F9Gqmre7vd9wWWq2EhIZYDV1pDHBlDj5fD7HzXzVbhfhIg:vGqmre7vnwWjhBFIg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1940 msedge.exe 1940 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 856 1940 msedge.exe 84 PID 1940 wrote to memory of 856 1940 msedge.exe 84 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 3420 1940 msedge.exe 85 PID 1940 wrote to memory of 1012 1940 msedge.exe 86 PID 1940 wrote to memory of 1012 1940 msedge.exe 86 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87 PID 1940 wrote to memory of 2288 1940 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb2ff04559282b873bee5e6665acf4b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bdd246f8,0x7ff8bdd24708,0x7ff8bdd247182⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5742896794824715921,8519764565921143439,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
6KB
MD59ec330055d4d5e221bbc63b4a2326e9e
SHA1b7db91ba6545d1a4dd3bdf57cfea3138cfe3bdcc
SHA25608247bb547f9933a16e5e60117306148638f7bb5b78195702afe058225e4a4f8
SHA5129a00cf4128e9f181a7b1c3aa263e09c5a0bbfc59bd7e1162016573a0a55f27e00fec5371702bc1a50291ff08ac7a6474afbefaade8761be310053275f67f8b08
-
Filesize
6KB
MD52d29c7ee9433d6d3582ac8c71fa3a48f
SHA1cca4c1f826f89a583a181cfefc912d181bc9aef8
SHA25635f7432139e95ef9e9919092fb1846e0e51efbe3c25df38ffcb5773133a073f5
SHA5128cd7447b99d65046fd233029644c601e6445714681456a147ee5d67c5e22c557977e689c3047d116f07ae43433765c98df95f920a42d34171b1502824d43f466
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c741562187022310bd6cab1a5bfe501
SHA1d9bba8f491c143018f5f937edf833f7ddabaaea1
SHA2568e512f0f94fc890386a73f07a2b5307db305adc8e11f74741d51029ad9b26d95
SHA51286bc5b7d8a7e2a4b86d151ec9f22fcd7f512ba1dea5d120ef48f2cbedb4d6b473868a73b09b2f79699da023407551c7c7cd45a38e1429aa79ae227a0b411337c