Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
3a2aa68b58a1ed2c7a61dd5b44b8cedc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a2aa68b58a1ed2c7a61dd5b44b8cedc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a2aa68b58a1ed2c7a61dd5b44b8cedc_JaffaCakes118.html
-
Size
6KB
-
MD5
3a2aa68b58a1ed2c7a61dd5b44b8cedc
-
SHA1
585e41f647a7e0d3f9a3e65dd29cff7ffd667649
-
SHA256
59afb9f7a901803ed0d4968d306b1cbbcdfeb5a81038baf1b1d0d11000a51ccc
-
SHA512
1ff628d6cac4ce1c492e66503953387d5d843ee782baf7a61b6e93276b44315730dc8c1b705bb97c1a75191ad72343995cc3b7cdf349a22b4a734dbf894b6160
-
SSDEEP
96:uzVs+ux776vLLY1k9o84d12ef7CSTUSoY/6/NcEZ7ru7f:csz776vAYS//4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 396 msedge.exe 396 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 4728 396 msedge.exe 83 PID 396 wrote to memory of 4728 396 msedge.exe 83 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 1712 396 msedge.exe 84 PID 396 wrote to memory of 4500 396 msedge.exe 85 PID 396 wrote to memory of 4500 396 msedge.exe 85 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86 PID 396 wrote to memory of 4184 396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a2aa68b58a1ed2c7a61dd5b44b8cedc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8bef46f8,0x7ffe8bef4708,0x7ffe8bef47182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15425873034390607853,6100024928204440351,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD5a39053a246585653859b0f68042008b8
SHA1bd3ddae2521942253d8f1e7af39c6ad50f12a03b
SHA2568a82e793c2c1b73658cd0ad481bdb5a4262b4c981d030140a4146153f5e50314
SHA512f3bb8c3aa9f40dded9fe9e608371b4c00461ffba42e2a06cbef326a038fe0b925cd96a5813825f36426a991c67e6279575e9dd0ff1a4b3929c8075bbf24bea9d
-
Filesize
6KB
MD58704dc47c365a0444af04e7dd39311d2
SHA17fb6cf18f2124ee69bad59aeaab2b20e7f11c9c6
SHA2561b7c068766e56dfcb51e170ecc3e200c4ad6800189f1ca2dcf28cdb1ec71b036
SHA512e1c60569a703a94345aa817b98ea77b732e5a6e67bb3a0843d7763ffb332c65134f5a192277f4bbd7d050ac5d94923752629c1da1fafd267455bdf4946f0db21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d2bd7d429f8ed8c72b7baaf60792885e
SHA13ff733d6fb93874b1df654c0f85997cb8e5fa5b2
SHA256eb2e30f05bed82b93115f55dadf6d290af430304e7d106bf6f4f3d1192ff77fa
SHA512a38b2c1af9aef9aff8900b52cebbc56cf0029c992af7ba71e354862e7a096e58a517a3fcc3a1ad113579f038d7384f38cfe620a9e7b868248c92cf530ee34dbb