Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
9fa9ca477f2ab0a82a5cfdaa5419712b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9fa9ca477f2ab0a82a5cfdaa5419712b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
9fa9ca477f2ab0a82a5cfdaa5419712b_JaffaCakes118.html
-
Size
31KB
-
MD5
9fa9ca477f2ab0a82a5cfdaa5419712b
-
SHA1
130708087fdb23cf6f90ed310457c4fe327719eb
-
SHA256
82e89a01f8fdf250ca8b827b1c925c2d4ec8f480e86d59593583925481f12c35
-
SHA512
e872921b91fec3733cc95a568268b6a89061c908369cda1ca62e0c06cc721b39c9c696eb13a2fce69d29c334c1f755495d0b9735e63c71a8ab4d24ba2c0501d5
-
SSDEEP
192:uWDfEb5n7XnQjxn5Q/inQiexNnCnQOkEntaEnQTbnNnQUMCOZA+RyFLqDxcYLujQ:zTQ/3cZ3yFuVpLkZQiKJqCQuO+Oc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2080 msedge.exe 2080 msedge.exe 4708 identity_helper.exe 4708 identity_helper.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3148 2080 msedge.exe 80 PID 2080 wrote to memory of 3148 2080 msedge.exe 80 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 3532 2080 msedge.exe 82 PID 2080 wrote to memory of 2508 2080 msedge.exe 83 PID 2080 wrote to memory of 2508 2080 msedge.exe 83 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84 PID 2080 wrote to memory of 1352 2080 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9fa9ca477f2ab0a82a5cfdaa5419712b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba4e46f8,0x7ffdba4e4708,0x7ffdba4e47182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3188 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2166759003204837495,9912579176537208117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD5be074a695848a2e2abe0bfd14827ca59
SHA160151f7f1548bc28421f13007645145f0b6d8c60
SHA25637eea5dcf0bee31c5198424f9823aa2265878de3ea9b71690e45b98d3ad161ad
SHA5129ec38ddc2827a740aa9edddb8251f5a58ccbcd0e101f5dfc426ff28a825f1ebd4e66b7275c5d03d534f55b321d904f52ebed5e4ecf5362987a0a810f152fc870
-
Filesize
6KB
MD5aee3094e9f5deeb72e3b6445b2b83eac
SHA14395131e8a22810f37be6273fa8a2869c019d00d
SHA2560f62374f64b5e025334b52a07afd6ffb8eaed8d86fd882966b76b073bcb83518
SHA512f733fd58509b3e7644a50dbae2bde6541f4082759b02e99ae3764d6cee4d8bc2ea93faa31f260fed91cc1828ae38f59e7f5a251cb181f21cb2ddd258bdc8723b
-
Filesize
6KB
MD5a2af104983de3bc51197c04e20124bbb
SHA11142eaf798b53f70abd0f818be8e78b1a7406380
SHA2565c2074ab69736964af508b2f56469db3ffef7347bb65bf4f22b42b039b2c96d0
SHA51287aa273f1399b152a11654005fd1a286b896d1a1807d3ddd80730cab45445cf60fffedf900ac9130fe6df34812d7f2fc379902ea791c12b365e5ed733685b1c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50854603eafd8fddec211ffbf78342224
SHA1143b76ad94090f0e639c063402478fb8b5f317a9
SHA2563d31a432c57458d904e3a36e56c7b3d4302b6404c6d02ccd909ee35224a2d03f
SHA512cd5af140da9d8efd220b59f4c918291e9111e34d99fcd9cac3d4d17c78a9507b170c9ffe6da19de89273ba620b514e07d4d7944c40a6d32c1170714b2b66d287