Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
1a1c5fa44ccaaeb1b4aaef01b2a20b0a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a1c5fa44ccaaeb1b4aaef01b2a20b0a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1a1c5fa44ccaaeb1b4aaef01b2a20b0a_JaffaCakes118.html
-
Size
105KB
-
MD5
1a1c5fa44ccaaeb1b4aaef01b2a20b0a
-
SHA1
658eda2df028cced99970680ad51f2ffab409399
-
SHA256
451d2b4d0cd9a896a28154a135fba1c481b055d6843bd3cb22fbbee3a2e31594
-
SHA512
b3169ab0b1d38fd69f7305732a677f622ab3f3af5f895cdfb156cae6769cdd8c4412eb63f20982f24ad7d243052735601ad92359fba3c3cdc6e266a9b64e574d
-
SSDEEP
3072:SZy7W0Hmhygyqop1/fi/cxwWhj+SPRP/LtREhqzwdZ5I:SZMUZ5I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3256 msedge.exe 3256 msedge.exe 1176 identity_helper.exe 1176 identity_helper.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 2496 3256 msedge.exe 80 PID 3256 wrote to memory of 2496 3256 msedge.exe 80 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 740 3256 msedge.exe 81 PID 3256 wrote to memory of 3672 3256 msedge.exe 82 PID 3256 wrote to memory of 3672 3256 msedge.exe 82 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83 PID 3256 wrote to memory of 1072 3256 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1a1c5fa44ccaaeb1b4aaef01b2a20b0a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16573687743037945041,9408633450673164218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD547b453f4b84683f82b00a77656c6122e
SHA14aef660d1c4afea96fc08c2bc39830f16a2ecb78
SHA256912bcd5055c314edeaf9cbf6a3219cc55a61155265e17e6512e4af1cee39787f
SHA5126c6ac68741546b530c3671255d7bb6de94bcb8ba96e72bc5b50a6e9571426fb51021bfddbb0c545c687b6be269adee4366bc70a3e242130a48233da35879319f
-
Filesize
6KB
MD5947ece1f038123cf8620f11385216bb7
SHA18f0e424dc48a2bd0ece282f43001e87dc5247aaf
SHA2560bf5999592a68ce9eeb29f86954fdef3a948565cfb78c82b5660226975c68b7f
SHA5126e209c50a93a2d5334e2a6b7ef1f130a06301486e20f7911ea5797e4f633b4bca5a2965b747498d16b9ff54f816c160e21d76bd97960b8037ff1cfa9402d01e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5ed3709c19de242ab7ca0320199bbc767
SHA1196af7abfd036b8c173d366253b7f8ade0bfe7af
SHA2561220bbe2ac26d5b81f00501fe1b34c70a61e4a385cbac644e914f2d5d835b039
SHA51234b0013e37b0c11ef13b27933b7ec400d5989b12b9ffa84fbc33ee549fcd76aeefd4de175ee73dcd7f1f50770843c4e9f2cdfa7cf8c62a2d6eb6a9897bd2240c