Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
-
Size
4KB
-
MD5
274e83a46d03f514d53cc879190294b4
-
SHA1
4bb35d47f42b09f302906e3a123a310c798dcb04
-
SHA256
1aeeeb2dc97c356a6ab08a42c352e133b3ea86869d44d4b43abb7fdb70f58fde
-
SHA512
aac3e9f135a97a2f93f28380a49e43b1005002b6634e08f633c5fc52b3952e09f6a90138ba001cf297a8552d48674650d9696de61337366ce7b433c2bf2c6913
-
SSDEEP
96:68TUdtUqSYniu9Z3otJCIbtlv8g4RCcMBctD:6hbSYiu9ZYTnDiJM6tD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 3948 msedge.exe 3948 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4548 3948 msedge.exe 80 PID 3948 wrote to memory of 4548 3948 msedge.exe 80 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 3404 3948 msedge.exe 82 PID 3948 wrote to memory of 4960 3948 msedge.exe 83 PID 3948 wrote to memory of 4960 3948 msedge.exe 83 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84 PID 3948 wrote to memory of 2940 3948 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\274e83a46d03f514d53cc879190294b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8103546f8,0x7ff810354708,0x7ff8103547182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,88414050388279113,15213501950763922733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD58af1da3a47e763ac645febdba1f22a25
SHA109849631842b2cda6f5a65afe0dc0a6e44be94d0
SHA256a8cea7440af0274ad16a10caea46e09c8b35f3cb657c23ffd9e65336c5e3ada6
SHA512bb431893efb100df111c657caa3c77d774dcb980e6d1b30c8b0cc9b2b5e0194c8aac9f2236bf0029a0850b0aabf4e6a72cfbad14a96327c251f34fbc97f1cd56
-
Filesize
6KB
MD538f03322b058a455d70909c033acdee5
SHA1d4b9096ef7ab406680bbb2ed0b06c470a8b32dd1
SHA25632b3be154c393ac23adae5c1d3d2f0ec1fcebd4121be69f69abef2b39cf329f0
SHA512f6ed91a9533b869444fc744b281c2ddcf221a94c1634b45b71e2071ae5419d5d09fcbd1c3694b5659b18f9d76fe590eacc881827e07311def0f82e2fb187b9ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54833e6e4dc30aa95b1699fcc62e957fd
SHA1a91f568e506d8eeac2efd23948465aba0d28a2a3
SHA256f9e072c3ce9fbc6868a142df14771e6cb676f74dfa486b859523b43ae54eec50
SHA512c3b6407bebd90e66a70f4fb7a72b553c82cab15796c76bf77941fe13df9413f72acf996a52bacfa6d2d3308d746f37d0308e04f0c51d1ab4521d5e9b068c4de9