Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
9d4045dde938d7df13c319c8a29ad950_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d4045dde938d7df13c319c8a29ad950_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9d4045dde938d7df13c319c8a29ad950_JaffaCakes118.html
-
Size
32KB
-
MD5
9d4045dde938d7df13c319c8a29ad950
-
SHA1
de35faeeb723ba7c3f4626164bb0c4da8a679624
-
SHA256
36140b632ad56c7f21b3ea7f98f4f3917f8fab9ded48d03959d45eab55e72458
-
SHA512
ddfc4ff22aeaaf4d1852730829ba452550b89d5c51fd88cd21900bc0b20461fe0d54b3afeaac1cda5f1829d00fc3713da6a64069198c0a6dbc17dfde08213df1
-
SSDEEP
768:XIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZGp2:XIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 4484 msedge.exe 4484 msedge.exe 2360 identity_helper.exe 2360 identity_helper.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1928 4484 msedge.exe 80 PID 4484 wrote to memory of 1928 4484 msedge.exe 80 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1788 4484 msedge.exe 81 PID 4484 wrote to memory of 1816 4484 msedge.exe 82 PID 4484 wrote to memory of 1816 4484 msedge.exe 82 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83 PID 4484 wrote to memory of 1312 4484 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9d4045dde938d7df13c319c8a29ad950_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9824869595522760426,1858124386941528158,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
308B
MD5690d49d2e34de05a4c434b71184c06ed
SHA19b5574d678c4f4cba8e65f4dd2548990ad2e992b
SHA256026153205fed67983789a59949dadd7a061b2aa5a2549bd56fe44b6e9e2ba4e0
SHA5128ffffc02f0a2f1499a5445d0371f076f6b3bc8c289e5bfe1e388a83226659a9ad464c0f933a04a7fffe813f71fc84aaca210eaf423e742a47d743fa73481b0de
-
Filesize
5KB
MD5e160d5067c3b5bb819b655b256c12af6
SHA13b0740f5fd6b6487f4dbefb3bcb737ea87759d70
SHA256b6f2a82407ce441dc96f40342e5c8500985250db7ba83e6c82acaeb077c04f96
SHA5121bc3d319da0f70d4dc101c1dc4997a7d0bc6548b9da6a7d658e2350a1ada7e2d022ebe15407315edd3aa338d37363af4f9cc3c0552171c3ca3a20e92e3c083ad
-
Filesize
6KB
MD5b0dd9bbf286ff03dc14452a7855f6ee7
SHA11054b5ae689496d4a34954011c88d5b9ea2a46c2
SHA2562ffd9259ec2c825cf72ae684e1b7d6e3b0a52d8c66db86cd5568a7c547e7e1ce
SHA5122a521e3ba8c132f07a9ceb6f0bc234ac5d2edc717ea308d1e36d5959944fa3fb62b8733ede5f08da54d752386f924932129c16a7585c8dbca1a4f79060157fe1
-
Filesize
6KB
MD5a65f620b3c801ada1f265cda36981425
SHA165d44258e559fde23e7af4ab17761312c489d465
SHA256202b534eeac9fa1d736f25483fef509544cad6da29026cb844e7e837ec74f4c5
SHA512efbb966d6a5a4b491b5f78b3cc30e5dc441dcec6a13995e2b1a96a005ad6c01bec81b5b77951a5a41723fedba4a93994b3ae587c71136873afa1473f93b79696
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD598cafdc3bbfb587b22d5218bc64b230f
SHA1d1b30746f45fec401e8295fb0f8b2bc783a10dd8
SHA256f42f50b914bc90005d59f2e91e6e45b3acf89d2fb7590324d2786538eccec75f
SHA5129fe4b3a91109ac0f093bc6d40649e35c7752a852e51d95a9d537c4a5bf3cbe8d80c9d01fc8e4ceef1c189954009607772860021d69c55ec3df7e890529887db7