Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
ae1c4ff49b5c43225e37daceccbb57fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae1c4ff49b5c43225e37daceccbb57fc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae1c4ff49b5c43225e37daceccbb57fc_JaffaCakes118.html
-
Size
4KB
-
MD5
ae1c4ff49b5c43225e37daceccbb57fc
-
SHA1
cb952ab0e981496e1d66260c8111d27f65268c9f
-
SHA256
debf1ef95e066ab4db71a995bace6aaf2591831b7c43a669fd2bb09201f5f138
-
SHA512
b4bf3ffcf3a217226e38bcf68bda69839a955387367693384e9227fc8f91876fc1901ddcba90cd367f885679c2f7173c61d82c7b713e56743f07d3d928028813
-
SSDEEP
48:MpJ1upHgQamI1IAIQ7Csqp1fjneK7txjYoVYCy61ANWm6mLfp39Ya837E0e:MopgHaAIQJqneCDuD6m7Ma8ro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 232 msedge.exe 232 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 232 wrote to memory of 3096 232 msedge.exe 81 PID 232 wrote to memory of 3096 232 msedge.exe 81 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 3996 232 msedge.exe 82 PID 232 wrote to memory of 2232 232 msedge.exe 83 PID 232 wrote to memory of 2232 232 msedge.exe 83 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84 PID 232 wrote to memory of 436 232 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae1c4ff49b5c43225e37daceccbb57fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9743991737481299470,7046820632229306109,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5b5595894ab94c2b41563a144560f717d
SHA1dce45eff9ba7afca3510c432d62e495aa9946cb4
SHA2569144c9ca10628004dba4742fa1603d69761b31625f2c086bb70cc2c655df48c5
SHA5120f2d45b3320553fb54be6c42a36e3345187d9ba42ba7d07000b9cf7ccc9e63b55d08fd7ab76fab4b4e13ebae14ddc3bd8a4b6036e3e9f616fc3a1a756a87c235
-
Filesize
6KB
MD5bdc46e6bf271152984da5c26ff772da4
SHA14d2e4c2bbd08854040697a537ce3597f6f51561e
SHA2567bdbff1c5a6b8265e9e87c8fd5743f0ef72581503c8d2363891147390153eb70
SHA5124cc9b7e244f5619a0cd39feb1a1c5206f30e3c54e3260d46397d5cfb01d303ad2bba893a26971d71f604ad67003900462a7e8b57a57e8f04ebd775489f16f4c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD50e159f94fc1da3632828e9b49321afdb
SHA12828bd9706ab3fe2c548d02844d834319a082216
SHA256f8c9e8a067daf1bd96d948884f8455fc62d605c90da1c4cba134076332603825
SHA5129822baab8833a2eebf6f86973c3142d78a50a8c215d787f96885f7b2533f552b4f6d9e918f2d59905aada053c9299aefc3e20544c9076b704f4b4ee59e7c2f5e