Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
a9229e427155a2dd2474cdaed130d994_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9229e427155a2dd2474cdaed130d994_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a9229e427155a2dd2474cdaed130d994_JaffaCakes118.html
-
Size
229KB
-
MD5
a9229e427155a2dd2474cdaed130d994
-
SHA1
a0ca1f981e499aebb9442b43513f42c4e480b411
-
SHA256
27028ccde95883cc50905a5d7abdb19d7823ca8ebecb447384ca0646959a1b88
-
SHA512
aa934f0212e61d1c6a3e6d3e385f53e67c19a2505de1405bcaf801d3b15b2849b14867fd7338d950b4a78a1bd38aa4ddb2a616b7390a7d7513866800b6278cea
-
SSDEEP
3072:Q0yfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:isMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 5008 msedge.exe 5008 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4640 5008 msedge.exe 81 PID 5008 wrote to memory of 4640 5008 msedge.exe 81 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 4392 5008 msedge.exe 82 PID 5008 wrote to memory of 2336 5008 msedge.exe 83 PID 5008 wrote to memory of 2336 5008 msedge.exe 83 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84 PID 5008 wrote to memory of 924 5008 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a9229e427155a2dd2474cdaed130d994_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bef646f8,0x7ff8bef64708,0x7ff8bef647182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8254384894920262952,8294116100696077348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD5445ea7c061c6e3e7efe7aada8029ec2f
SHA17aac2fc054e0b52289e1512f6e81d1bdcbf1405c
SHA256eb7b3da35a5953f7b5101ee0d8dd8694954976cbef95ad937c5121266d4a5cc7
SHA512e9045edb2ddf6a28132e0d189ba3430eca6f09c8437674d79e115740bb19d0f8bda06d2607b058ed501bc664d45da3df3c5513af1ebcbb407946fae48aeec2d8
-
Filesize
6KB
MD53ed67553dda3517e6a438d46bc03c8f8
SHA1e6e792dd0d2d6f77b6bf5579f36bfe3573dc164a
SHA256a66885d0c1b4a864a8f6b1f9cca44834e3204ce12edce6d398937d5663659205
SHA512359dc567b8240d7c5a786ee9a3cc5cb0841f35eee90e4476c9a9222d1a654dec2a6b7bb270d8c7f8321f13ae6ffa53b7a6a5319bedca470d927d4f655fe933ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e0ae186bf659346b929a231fa9fb403f
SHA124824849700702896405fe01680aeba7bd2fe8c9
SHA2563a7f73f5707770d28c042902743b6fb29ae1ee540320671143f7b3d62ae1b15e
SHA51201a3ca604b6019ec7bbd52c5e322023ebbd4707fc28ca835fe1555ab8ec8f741e9f0793056ef401c3d3b26af7e0363fbbabcc6e9a6e980eb10e7f51bc9c91080