Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html
-
Size
4KB
-
MD5
a38b8743c758be39c501633160b2c9c0
-
SHA1
5b567bf6225f8b674b5bd4e248792b3524a03543
-
SHA256
fdef280ae8611a7212acdb56d81a16127e0953952bdbde52e481a8db19c39ecd
-
SHA512
969108c6b7fd685b276cf746f9a7125ec2a8bb825ba0130a61ec6d6c5c6f04540e1cd8f546215c37c9d4f16ed7d8ec6c601c6214ec23d4047ede7f09f68d82db
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o38e1vd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 424 msedge.exe 424 msedge.exe 2152 msedge.exe 2152 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 564 2152 msedge.exe 81 PID 2152 wrote to memory of 564 2152 msedge.exe 81 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 3468 2152 msedge.exe 82 PID 2152 wrote to memory of 424 2152 msedge.exe 83 PID 2152 wrote to memory of 424 2152 msedge.exe 83 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84 PID 2152 wrote to memory of 4136 2152 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee9746f8,0x7fffee974708,0x7fffee9747182⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1305833175507044084,6216365777287314285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
292B
MD5827e9baec9864e6083e2d8c00353b74b
SHA1513338ceddb93c6a3e21cfbd46ad4df4dbd468db
SHA256109a20972bbfc93c05488ac407c6f725e4e885afa7755b83ef7030e3007fc45c
SHA512892aff42846fca926b78c5848db285357dd22d3d0b83439c46d8118e118f347a1103a8c762936c04b7fa7bd7a2ca8dfa27a303929a9a58d4b946ac1918c6fdd9
-
Filesize
6KB
MD5e8e10bf7f1a9f103316a03d38dd6d4e6
SHA107fe4e329fa770e5bd46cfd0b43791d6558b61b4
SHA256040c6142c1d57b9890c62883c08d1549de12b8259623ac5c06f3c7b7df7dd8c8
SHA512c569ce85098f414acf49fb1c27a6b04ecca04b28b393bf0a598a187f0ef455f7aff2d3b1d669b183d84d06c572a17208b55786e8ab01610e7d7759fb30c1650b
-
Filesize
6KB
MD518d42a3b002bf2484931e6a2c79b9c10
SHA1cca2760433567930898ae1548355dc794d2c6a92
SHA2565c35b1c8870b29c80d64d6df4e5566698991b890b2a5452f2f2d73ffb22f5bf4
SHA5123bbb8f8b5ca85d4252a524f8b933dc7ba198e3846bbf6ae94e7354b72f9ae604fa04148b190ac43a9c7277fee4de5ab8f748f1b8cdd18fbbb1ae1fc070fb8496
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD543c6e4cfdf3430d4c77860640cfbfc72
SHA1c6881760297274bff1f6786c14de60cb4feab3fd
SHA2561d92edd410b07daa01d39c0325cd7112ff9f18e406a4978ec6532535b6c2ccb4
SHA5120502689fb877467222f260fccd2a9030143d3578f4f4af8affc70d75964710da10303d9292b5db9d6eb5be00dc441a349d7c3babe870bfd84174058c71c32d1b