Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
48220592904ae8876e261acb0c85aee1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48220592904ae8876e261acb0c85aee1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48220592904ae8876e261acb0c85aee1_JaffaCakes118.html
-
Size
6KB
-
MD5
48220592904ae8876e261acb0c85aee1
-
SHA1
d71cd3082802752cdf538da3b962fc0883d7412b
-
SHA256
35521683e12f6de51c705206ba9b9e11b71d6766f46b1bb5ccdded5bd9e38e0c
-
SHA512
5c5ba78567851c01131ea7c8b08b333fceb801427f6480e1931a4341c36e6ab2f2426205d56d5dfcddd2c33faf8e6429e8349661998cb5a7c73d9aa1f2335350
-
SSDEEP
96:uzVs+ux7tvLLY1k9o84d12ef7CSTU3wZcEZ7ru7f:csz7tvAYS/u0b76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 4936 msedge.exe 4936 msedge.exe 2188 identity_helper.exe 2188 identity_helper.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 936 4936 msedge.exe 83 PID 4936 wrote to memory of 936 4936 msedge.exe 83 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 3712 4936 msedge.exe 84 PID 4936 wrote to memory of 1732 4936 msedge.exe 85 PID 4936 wrote to memory of 1732 4936 msedge.exe 85 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86 PID 4936 wrote to memory of 5060 4936 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48220592904ae8876e261acb0c85aee1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef54946f8,0x7ffef5494708,0x7ffef54947182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11974325469965129685,14078133128889596115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD599346eea0dc20f7a6ee6e92741256379
SHA14dbf9bdc1cba17690187a81bfbfdf4ea7d6141df
SHA2568b1af82db692fb77c6b08df80228a38a5bd94857a7c595fbbe3523a0f23a817e
SHA5121f7260ad872649595b2734f19f7910801e4773bc0626aadfdd5132496eb18544f7b510a56c065bba01be3212f6813d73adc0c3ed84c01c29e2ecb5d133de29a3
-
Filesize
6KB
MD5d4bfca4f4f40e0303cc3c2e4c01d048b
SHA16a9d2c1ed6ec080c956bf5de19417382661f849e
SHA25620d09ef3ae635795f8d6fda268c8bb63f42ba7e5070fa332e417de239c225469
SHA51239114812f8e144eb20f3c57b5fb5f869fc71c6548dfa43b3e71d747d8814570d15200559b8cc79c354521038bd436e90282cfff508f230d3547095cb71b0af8c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a6ef6f9b2afda29f371ea15ad3d33040
SHA136ef157360ba1e95541f6d34bb8113303ceaa2ee
SHA256c97b68ac18c2d08838001bf8ab7734fa9c7b75d478cde4e2bf7fc9c756aa26f0
SHA512881dfffa68a1da3a6e920afcd90849acaac6bdb2bc1a650fce40e9251960597dff3aa2c05a8660a6cd0aba6e527e61f4f573d5d9e4848f678e38646c6807dbde