Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
02ab6038137ed4b407180ed1d50686b0_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02ab6038137ed4b407180ed1d50686b0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
02ab6038137ed4b407180ed1d50686b0_JaffaCakes118.html
-
Size
1KB
-
MD5
02ab6038137ed4b407180ed1d50686b0
-
SHA1
afdc9a17ef4b76d03f695b957c8115fa37163968
-
SHA256
bcc9e3adc07e8e503d199543d3ffdaae26b6f552a462e8d35b35e0141b98174a
-
SHA512
549f6f338bdfaf68722f117db480032404ad6763c669d857db513c06c66941f3ee37c54cdec73fa54c7306c6b18dc0c219399740e4af7eb5d294d180008f2d61
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 628 msedge.exe 628 msedge.exe 2324 identity_helper.exe 2324 identity_helper.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 2608 628 msedge.exe 82 PID 628 wrote to memory of 2608 628 msedge.exe 82 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 836 628 msedge.exe 83 PID 628 wrote to memory of 1528 628 msedge.exe 84 PID 628 wrote to memory of 1528 628 msedge.exe 84 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85 PID 628 wrote to memory of 3336 628 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02ab6038137ed4b407180ed1d50686b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef34646f8,0x7ffef3464708,0x7ffef34647182⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,12976158373331504055,4371531874771143252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
5KB
MD5c5e742b2a248118b8854b5f7a7db0a75
SHA1b283704051b136219db16f65057a9e997b4237de
SHA256b47173843f6e95063721e340505b6802579237e1c31882996cf50c9706b39e60
SHA5122bd958d1b629972b190b5f11620f528fd2661e3db382d2ae8ec3b5097fca93a9379c5ec55f8f46992766f5249e52fec682079af08b8a99fd5730e31ff261515b
-
Filesize
6KB
MD520c7c6a22fc06f2c52dcf5b651bc1f08
SHA1ed7ebe34aac89c798f45f62a3672c049a2293d55
SHA25641ffa546a48592985955c7cff4ecbfa6b2156e2d1a367a96511faf9278010353
SHA512dd4aced60653ca2a6ecbd3d608421699061d5dc4038bd3518464cb18ad38dfe9ec1c25fe333bf238d226f029ca8cb9dbdc3594cee33f92ea9f06da716d09a5f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56ee6fd089661e9fec157f4e2c6a10407
SHA19ea5171b90cebb5e84370754f7bf0d95e07fd836
SHA2565baf17db3f58f1a084aa50c5ab77e7e01530d3649185f2b50366eb670af8d182
SHA5120ad0524239855cf20b6aeaea459ae1db790dc5c0cf8087c6d333f69ecb2b99d8267546b4a9b6d765dfabc563139b38f5694674e77606298bdb389c7362602dd1