Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2908e9376572e2ca7936f4a0ae51a4fe_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2908e9376572e2ca7936f4a0ae51a4fe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2908e9376572e2ca7936f4a0ae51a4fe_JaffaCakes118.html
-
Size
7KB
-
MD5
2908e9376572e2ca7936f4a0ae51a4fe
-
SHA1
6c4c990d36d0ad2ac9add327e0397685d51164ad
-
SHA256
e534ac53d39f96ad4e9695528588a5c6acf49d34b0b5316e6923c4df7b78475a
-
SHA512
bcfe18a9bea414db05edebf28e29e5b2da72f8765092746267bf4b800483f778b34339e8e60de4679929df669e79a41cf02fe123224e234fd089fa51c5e074de
-
SSDEEP
192:vJCrPVQ/j0iQJk12Jx39v5vt3BZllhnxOt+Pd:8VQ/XQ6Qx39v5vt3BZllhxQAd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 436 msedge.exe 436 msedge.exe 4380 identity_helper.exe 4380 identity_helper.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4576 436 msedge.exe 83 PID 436 wrote to memory of 4576 436 msedge.exe 83 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 64 436 msedge.exe 84 PID 436 wrote to memory of 3608 436 msedge.exe 85 PID 436 wrote to memory of 3608 436 msedge.exe 85 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86 PID 436 wrote to memory of 1328 436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2908e9376572e2ca7936f4a0ae51a4fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc451246f8,0x7ffc45124708,0x7ffc451247182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17854786970553905681,2288108617315771720,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD53d39dda70c5528cb990cb5db4f74a307
SHA1a377de8d60e4f97565805ab6e1f6f72961ff0057
SHA256f76dff19346c4ebf4249205f695a85ce9c3cbb8756e1c5d3b50c58b5ab9a21c1
SHA512140d03c8f95a551fd77819ccd659fdec0caf8031acd9ec0d22a5cbd4c285a989a447cd65ef70f75ad153bac0fbc56febb75119437b74eae67f9a425a3051cb15
-
Filesize
6KB
MD5fe3da7c4b843b7e9402f5d503cf21aa7
SHA13feedbcfdbbcbc5070dcd3fcf2e2d304b227fb4a
SHA2568a516a238b7f5e0df5448dbc2ec06ba92c4807116316578224924dd5f1c0bded
SHA512736e574ed03aba490b9602590d35d2fbafc25cfa1e2b64fee83ad30711fc4a836af94bbc5ffb3db93da6f08c0b3bb64955ea44e5a09299f21e9bc89dfddd1b56
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5a7d5d6f736ac8cc05a4425303d4b1b26
SHA1f075b56307c7e738af25bc250ffc5ac0d2190d8e
SHA256cca2d77604161deca619de30eccdc06257d584f1766f2a672a7d6988e73188a8
SHA512b333483bcb74f5b47cf5ee87bf07b77dab48a33a072de1650db485b4c9002469c1c0d994fe297db69a16138272285c37acd5a792ad3c5e3518ac58e29325ba74