Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
2a89b38f7cc8c99f482c83164baef059_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a89b38f7cc8c99f482c83164baef059_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2a89b38f7cc8c99f482c83164baef059_JaffaCakes118.html
-
Size
3KB
-
MD5
2a89b38f7cc8c99f482c83164baef059
-
SHA1
76de33efb46e13549fa94906c0a9849c3ae7d63d
-
SHA256
64df4a8ab0dd4c1d4db0b132996f242d08488f7b592c5ecea509fe94e8d6a9b0
-
SHA512
3813bc9767d02943a33960956144efb2fce464b7f4c6a9d991f872e544f61b2dc2ff5f24def3ceb002956d31df1fd301fadab091ae7c2241eee2632370032723
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 3620 msedge.exe 3620 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4128 3620 msedge.exe 82 PID 3620 wrote to memory of 4128 3620 msedge.exe 82 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 3692 3620 msedge.exe 83 PID 3620 wrote to memory of 4740 3620 msedge.exe 84 PID 3620 wrote to memory of 4740 3620 msedge.exe 84 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85 PID 3620 wrote to memory of 2312 3620 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a89b38f7cc8c99f482c83164baef059_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc658646f8,0x7ffc65864708,0x7ffc658647182⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3799976367506778378,12039154318837196468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
6KB
MD5a30ca41d1ba2e6374737b1067d7d3517
SHA1105a867bcbab81a24775ebcfb965c52070bd6cc9
SHA256ea8d2e2255ec5d231b813314ac5c7006720abdfb25dc970220a7b44b696c60d9
SHA5129f625d27ff099eb91a559600bdae94c85d046e1cb071a261c1ca47a8425cc8e7bb8e7f0747d39d0d586f6ed340e2a1cd588bcb8104cd943110042d253d574db1
-
Filesize
6KB
MD5a642a16bb64c58d8658edc525933f65e
SHA1d1a41953e9ef02407e483d089daf02934ff74d07
SHA256f192af2f71c682c36e8f70027eeb715cf2762a813774510f161aa5f8d6dbe476
SHA51288017b79a76f70e20723d53e7be474c47cab51bf09c39ab4b3395af87606335e1d294992891363571bf3a5c635b5b1c58286c267ce9949ce13a1728abd633932
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5368be8630f2846ae6adee8a4d4332678
SHA191c6ba41944ca5aa29f3df75fdbceedddea8cd3b
SHA256e6076aaccd70d07a02e58496c1cc713b96cd198c7841f8b1946eaf27d3ae8fec
SHA5126c5f292f2eb3c06a5be2dc588d67329ee40032ca104af65523ac5a77a58b58712ac1fb64b0a52985f0346d242f2ab659d6108f53229e0c690446c42ca61e5c08