Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
-
Size
23KB
-
MD5
9ab0b66d4e9713e4088a35f7c552416b
-
SHA1
2253b83d760f44df39d1b9f4c7bc908e0f3899a0
-
SHA256
ac31cb64e42ff090aee8fc3a55cfbb8a4e3b4b2780deb51e7ad062d068c15184
-
SHA512
a4080885d0073313477048c81a686c5d3c0f9b968703cfbc67d771ca2661a3c31016f091d5d7c3b541783daf5f629261c854937db6631ceed948c9f8bc1d9160
-
SSDEEP
192:uwjMb5nlOnQjxn5Q/QnQierNnenQOkEntE+nQTbnJnQKdjLvMBLqnYnQ7tngYun9:IQ/vE1T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 2120 msedge.exe 2120 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3496 2120 msedge.exe 82 PID 2120 wrote to memory of 3496 2120 msedge.exe 82 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 2372 2120 msedge.exe 83 PID 2120 wrote to memory of 4940 2120 msedge.exe 84 PID 2120 wrote to memory of 4940 2120 msedge.exe 84 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85 PID 2120 wrote to memory of 1820 2120 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc002046f8,0x7ffc00204708,0x7ffc002047182⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,448355979249092603,3938905664641894063,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5bdb85d10dc71fd2e69eb08eba76d3d85
SHA11c2af04f9da7eda947a89f2adb0d8ea07674425a
SHA25674f83006714efcc508ba0011421098e0f7cc9452b40ec8dd87ca920d2056c39b
SHA512060267201f20998b9988881130757f7c985fbaa1805bd4e5f247b1d47fb5c53c0c164a8fa50595b3b4781b17718c9a8600b442ded06b3b8ffbf0a5f6e651116b
-
Filesize
5KB
MD584d2cf24654d4897e883976d0e055888
SHA1f3ab5e763e450d72e595108edfe106cf58b78cc2
SHA256a15236c9e176b610b783e449a92405b8d5137dcf59ca247408f9478cf736947b
SHA512f515113cf56865349218d921809e6d735695f7f9a1a325830eb5ea670d80e54e773a33e648c574f44b4440b5b621fca44e5a36cd8557f862f733abe8e82a2797
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5ee4a7624afc6861093b2d4e4d8f0d2e3
SHA1b87a1c700f8b5f809c97a64a75d4b8d29b26bacd
SHA2564acb7969b5f1d49e5b1c984679c7afdf152e2d699b83c82c1a9701f96f244bdd
SHA5120e1a8a3b17cc6e0448a00c4d969ddf4f2f5d614b30dcd691cdb5715c00da43468b9a0b78e598cbf38e21b942954062202a9f10f64fd33696d6d6296db239c141