Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
aeb5e901227aa9a084f5879a6ea85e03_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aeb5e901227aa9a084f5879a6ea85e03_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aeb5e901227aa9a084f5879a6ea85e03_JaffaCakes118.html
-
Size
108KB
-
MD5
aeb5e901227aa9a084f5879a6ea85e03
-
SHA1
1cc27c8038b1361595f331a5e5a6d43c4b95162a
-
SHA256
b5cf4ea7ea40cc42668dc762682c1dbcd203a90121652411f9acddadc4c2394c
-
SHA512
e22ade093ee83b55163716714fb21cf0b6b9a392348d022d96bfbc09569e0c05cb772818bf1c0d75e04c39db6c67df5772e6030622a48c12fcc02ae8f057b878
-
SSDEEP
3072:42vJ1n6kxMjhY13iQ7eCJxBxLXXRbpi4mwTTfmF6:3Vy45xmwTD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 1720 msedge.exe 1720 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1352 1720 msedge.exe 81 PID 1720 wrote to memory of 1352 1720 msedge.exe 81 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 5064 1720 msedge.exe 83 PID 1720 wrote to memory of 3468 1720 msedge.exe 84 PID 1720 wrote to memory of 3468 1720 msedge.exe 84 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85 PID 1720 wrote to memory of 2492 1720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aeb5e901227aa9a084f5879a6ea85e03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee9746f8,0x7fffee974708,0x7fffee9747182⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12702238393773186851,2142706173794668843,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
1KB
MD5578cc7a1750d75a2ae252ccc76812e27
SHA15443e9218fe9647fd1a23c19911e806b4de919b2
SHA256c57b390b02b8baec87f0e9f685aa7e6860d91d692b65e76f67ffcae1ee594760
SHA512327b6ca8db0616d03a45e8d373f02cdab14546da405964784e1ca4e410a49d558ea1fd05a98feb3f688573c58be9c9cf3c212775892ce66f6a2e9e23feeece83
-
Filesize
6KB
MD533745940b77c98e94fadca6cfbb4cb12
SHA12304bd5b893a34272fcea968a26e003872d31450
SHA256cccf07959ad3aa508ee270409ec21ad094bf065554b7242c6e76802dc1cad003
SHA512ac1f36bd029b4a901a667076d8b039fdb64bd21c9c157938946dc3d01088f57ce06177a949df8b59d05f9ca3ab9c4bd63b99e3c2fe902e8d80be52725681ca9c
-
Filesize
6KB
MD5eb7965a86843ada8e9e238c3cb6206f8
SHA19e7516061ac27e769863a0fbd005f3f2880e66a1
SHA25608c1bb8ef380738be5a5f33f074bf43e6036f4411bb370c8f1a73f718502fb16
SHA512ab302961d87847a7733b203f7fb34bce1b83a3c44d425ff3b6fa8cdfbf711b50b985e1300b36d47fad5e024b6ba3a3660aab83c9f5efcc3d05cc3f4c6a1498ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51b029144d186532a656b39e986f500e0
SHA15e514df50d891ff9a6b0148ab275f5a89323d52f
SHA256b8e9e60fab24ec1ff57c2f90a6c292fc33653e94b6d1a012266bf80bd362233f
SHA512552358d47e014eb5f59712a75c9650d28118c31452d9e33f7970e03ca96f063a80c744ce570fc9699e488ca2ce1a667b0a48ac3ca924fab510064b5b33d7978e