Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
4618d211df46dc05315824a62c12e0b1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4618d211df46dc05315824a62c12e0b1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4618d211df46dc05315824a62c12e0b1_JaffaCakes118.html
-
Size
2KB
-
MD5
4618d211df46dc05315824a62c12e0b1
-
SHA1
86c1c8cb6c7ff394f8d900c67dbda4fce9fc76ac
-
SHA256
41436002abda4f1a8488d5266fac6d47c7c3460ade4447175eccc7ea63df498b
-
SHA512
adafffec311bb69d2dacdfada1401ddda5271a4a4259b24691586b2d95d428d7c5c79611d61b610397b25f1b0a63f92d754b83f0eb6b26bbefcab8d9a7803e3d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4796 msedge.exe 4796 msedge.exe 912 identity_helper.exe 912 identity_helper.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4328 4796 msedge.exe 83 PID 4796 wrote to memory of 4328 4796 msedge.exe 83 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 436 4796 msedge.exe 85 PID 4796 wrote to memory of 4056 4796 msedge.exe 86 PID 4796 wrote to memory of 4056 4796 msedge.exe 86 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87 PID 4796 wrote to memory of 3696 4796 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4618d211df46dc05315824a62c12e0b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff083446f8,0x7fff08344708,0x7fff083447182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5399960801213041356,86734523251498363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
178B
MD58f4105308921911677fd4596e71b76b4
SHA124d4d803743ba8f40d4b359a988eaacb8d71e35f
SHA2563afa80cec9406f9b055081bc16e6ac4e8d14c1a18056df71eec0b17675b95145
SHA512ffdcaf8e25dc7c248589f532d9c5fc29fd33b8a527a1745f8c39b5ced8cd4e0b36393a5e1449bd90eff81b770f1f81778550fa5f48dc154a909f32cf5c6c9512
-
Filesize
6KB
MD5487bb5df14d3cfef7ccbd519bd2718ae
SHA1a2e1af56b090a72276848d76e59abd0b4ef235aa
SHA2565d04af8e0ba4c5d487f94e2332e6b9366e3d1325d9e0acb324641623c8827228
SHA512730fe0653899e8327a92d1e37ad3f107755217f23e8f030572bc9c116ff2b098d76853f33c152ed000506fea565b0e92a42ee43160fb1c8108ab06b4f5faafae
-
Filesize
6KB
MD555e3e97327b7f0a72ab3fd1a82f42576
SHA18418d9654d132e6bebd44b36334d59e72a1b8d77
SHA2563340a6eb233520fb2ed008f5f4ea26f9228f06dc6ddbf7ffb43d44a09c83eaae
SHA512ef9501bb249dd6284af500285679d6350dace446dd80bf5f84788ab960e281c47d8290fe71f62bd7d077050c3466cf65ff4893e0e602ecd62baab23113ea6301
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50dd7789f8c6a3359ffb2b56832a27dec
SHA1369d54831a85cf01454cbeae64d0e201dca3133a
SHA25678be646bb23cee03c7f92a6d2a20b9c2ea47affeefd3edcd6552786871a3817d
SHA51221800bedb4b882f6f51df73215ca483e3636e88931614ca47d2d61c1b7854e0cb212bd91c3b37395a861efc2bb44df95a8898b60638d5764f26a841672764bf3