Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
6a87eaa2cf07742630e12f4f4f341de1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a87eaa2cf07742630e12f4f4f341de1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6a87eaa2cf07742630e12f4f4f341de1_JaffaCakes118.html
-
Size
7KB
-
MD5
6a87eaa2cf07742630e12f4f4f341de1
-
SHA1
2de0541029f68ea67f5199f84e57bd5162fc3898
-
SHA256
5cc91b347e48579b9c888d84a0128e1add7b386c92e3b4541487e9b42fc03434
-
SHA512
ec45684e888817d95548dafe957d5d5fd2ec3fd1ce4af2224954f43e009ebb7786a428787d2829af9e395fb2929febc09ce051ca6597654919f095926b9c4609
-
SSDEEP
96:LhM3sHfowrg+4j2qdVzP50AYx2NSQFhhG8WhWJtd6VZCYu:LhM32ghdGGSahG8Woi0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3152 msedge.exe 3152 msedge.exe 3816 identity_helper.exe 3816 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2808 3152 msedge.exe 85 PID 3152 wrote to memory of 2808 3152 msedge.exe 85 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 2640 3152 msedge.exe 86 PID 3152 wrote to memory of 3692 3152 msedge.exe 87 PID 3152 wrote to memory of 3692 3152 msedge.exe 87 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88 PID 3152 wrote to memory of 5036 3152 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a87eaa2cf07742630e12f4f4f341de1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,1155952757835506754,13436020503767061644,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD58cdfa1f12af2bee81d649c7c4812df2e
SHA13f1ad48e858e7462bae97f150c99316b579e2c3f
SHA256ac1d50b1264c6012b061383a51feb3b2760e5815e90151bcf51ad5a5ac9e04f7
SHA512ccbfc1843384ce98e233a64da4000759b6ef31550f106ed5b1503fce5adfd1a3dc4dd394bb9083079c25def5f8b07d361fae3a70cbc04373d88bd171e1252e5f
-
Filesize
6KB
MD5efcab8e905e7b2dcd1ae04c8bc676942
SHA1da8ea7c3a4f48f3b6b229a26bcf424a8f3e5e504
SHA2565376ddd4a78383657e29d9ac3b7c8c40cd89db1043d131e5fad0dec020f5ffac
SHA512608c611bf763dab71a4d8b31c6b737d266ead5bc20fcd449d67d6b39ef74d4aef2e88406b4109aa94d7a97294dee1f144b962298ba11a384cc41606033d14222
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5126506928d8eaad42717c7a0684a50c9
SHA1082bbb7e71d3b68f1f667a3ff4ff76c175529259
SHA2568b33d5cba3c90471abf68fc42cb0bd15539f82ab4a64825d7fcb47c4c8c04348
SHA51295542e44f05c8106f8c4d224bc6d80ed70165ecc02baf91b7d63b1ceede8a83febd1d368aacab92f97a35ed9f698216a774517dd0bddfa00917267a64f24f18c