Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 22:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a6ec438c61ccab7838f3e370fda43b25_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6ec438c61ccab7838f3e370fda43b25_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6ec438c61ccab7838f3e370fda43b25_JaffaCakes118.html
-
Size
56KB
-
MD5
a6ec438c61ccab7838f3e370fda43b25
-
SHA1
22a2416bde0f3e4521d6169193e6c04c2d49a186
-
SHA256
ea146b6cd80e6739c392d4553f00989675ef06383a2db0d5adbbe7b3a169a6f1
-
SHA512
aaa4f0eef9823dce227d44e39323b524f58eedf919f970642f80f8313feb96f3b0d1bc4da2ebdbcea5956afc3178a9ae36cdee1bae1a467db8776b1431414cd3
-
SSDEEP
768:S21vF6b3Xi0jB2G4SpUtzl2MrQhOz8R5zHfYL6:S21Nu3XRdytlmOz+d/YL6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4680 3108 msedge.exe 81 PID 3108 wrote to memory of 4680 3108 msedge.exe 81 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2060 3108 msedge.exe 82 PID 3108 wrote to memory of 2776 3108 msedge.exe 83 PID 3108 wrote to memory of 2776 3108 msedge.exe 83 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84 PID 3108 wrote to memory of 3292 3108 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6ec438c61ccab7838f3e370fda43b25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,930260852505248799,13985268213272754283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
Network
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
Remote address:8.8.8.8:53Requestgreatbeautyadvice.comIN A
-
335 B 5
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
-
588 B 9
-
335 B 5
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
-
335 B 5
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
DNS Request
greatbeautyadvice.com
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD53172ae7e3fdc010e47c953b90f5805d6
SHA135e103f9d2374877a0902406a19890eba829f5ec
SHA256a83e93470552e57b36fdadf8513919e864ef14a609e514915d95db8e04899daf
SHA512543ff39f052b1ad3a9f0325fa030c9c4517a7705a7186d105b5e16d18f55aacf7deabc5c401a3b703073227448f3d2d5e74b1b8e9c0fd266c74ee5659727d190
-
Filesize
6KB
MD57bf711714138f86d898a200dc1f7bc25
SHA1d94def7a9d5514ec30bce52f54eaf5f1886ecea2
SHA256e86379ba919f5a1590cc3610ca045503004ec4e264977dd6f4c05558026db6ca
SHA5126ebbedb253d3eafd10680ab6d6a8df9fc97cc7b97f33c3737f512b5bf9afe216c265400bf63279cbeb87b87cc68d0f17a281c8570fe6ef3676f2bec919420a03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5dc5879e3350952ea4deebb3dcb7cb553
SHA165b344c5d433304656811676da6bd7e0100ae2dc
SHA256d4258e2649da73ce5fb2cb8c9ce08de1117c04236b23575da376b7030d5c755b
SHA512a4ab8fa5a3c37ec7f3f046e34ea45adfe01f08ca94164ac59697ae9110fe277701aca07ab00b54636f4e822f856a925d98870597a71a57295de74b4d61ab3b5e