Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
072945a462986b3fa288f4aa2d9e7ed5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
072945a462986b3fa288f4aa2d9e7ed5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
072945a462986b3fa288f4aa2d9e7ed5_JaffaCakes118.html
-
Size
90KB
-
MD5
072945a462986b3fa288f4aa2d9e7ed5
-
SHA1
9a8979126294f00c5e6b192543655483c3776dcf
-
SHA256
2c13867c2a13f59f5498e1914c8c645220acd4290dc496b11908244955dff21b
-
SHA512
8c95ac282a8e06143454074d4b4d31cda80a3e338310481134a04f7b9f9060913d8333f4a451e41a3e2d87c7ffa6d513188038f69dd9a9452c6f5f98b4d02ef7
-
SSDEEP
1536:Ma84dht4xTwQ1DZy4HZOC3zSo6GhHZX6gBr+EfZQvDnRa:E1/D6uCERt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 968 msedge.exe 968 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 1164 968 msedge.exe 82 PID 968 wrote to memory of 1164 968 msedge.exe 82 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 4756 968 msedge.exe 83 PID 968 wrote to memory of 452 968 msedge.exe 84 PID 968 wrote to memory of 452 968 msedge.exe 84 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85 PID 968 wrote to memory of 1484 968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\072945a462986b3fa288f4aa2d9e7ed5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa712346f8,0x7ffa71234708,0x7ffa712347182⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,11362855256458511686,7287329975069714239,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD527b12e2cf47a5cae59d0f62bd576eda0
SHA1251e427b4cfb0d2bdd7fc8625bc26894a0bce934
SHA256d7e87ee61fd4d621c5a04a60ed01faa815e59dc2f9bcc3d73bc37096d243285e
SHA512836733ca4954e4c4c8ba5ab65a7cf33e2e376840f6297e475df48871b6704b7910b104432ea7505814ca4ab570a6a0bc399d2bcd8f822e535d0935d2e4cf2b3e
-
Filesize
5KB
MD5a93d2f3b4fa93b6570f2b491e6c490ef
SHA15a0d6206c0e3e31b49ed2c927e6a4b268c7bce9b
SHA25625da391a082b7397ba6e5e4954798ff6919baa247995ad596b3bf0f4f00b0712
SHA5124ce77141462c3e961082e5ab854207a5c9dbdf536db306e09571696e78694e67fa83308c7e2de42f4099d2838785c0ad6c2a41f7b20800556548f6bbd5b3fd81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD540e926d80cbbcd23a6ef1b6895db7bfd
SHA18f2f259921d13b57be8d44377b31d75e2b2e5c03
SHA256de1fcdc78d56307de006bd9072ee1a92a8e865ee869c33c80e31edbe101552c4
SHA512b9601686e176200d7066ab237747d17aef47ce64b104444d510b22939962bbea0c96f4bfb2d9a6a44fab602b807a46d2ba2f97924a51f19910e618a63a9f8e1a