Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
-
Size
12KB
-
MD5
488b4495e3976cfb465c35a628ddc4d7
-
SHA1
67df6354df1901fcbb050e5cb280be1a157d439e
-
SHA256
96f45b752c3c8e6d98a695f83d337bdcf57a973563b003db7f1c22b2c54f642d
-
SHA512
1211c679146602df5a8f5d29f6f3b249e67e44a3d525ee75f81802eec8bbb9d61b64c1199fdd6b7573d0e8923842a8f2b20ac8e894cd8f4df5868f856895de95
-
SSDEEP
192:FQMtmj/UziaCsOhAhAnqo/lX14v1ooPt6uqQBMINCTW4ridwcfff2LWfv+Npb:FQOz+sOehePlXSdo4xr4ri0Zpb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 4480 msedge.exe 4480 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 912 4480 msedge.exe 83 PID 4480 wrote to memory of 912 4480 msedge.exe 83 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 2856 4480 msedge.exe 87 PID 4480 wrote to memory of 1816 4480 msedge.exe 88 PID 4480 wrote to memory of 1816 4480 msedge.exe 88 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89 PID 4480 wrote to memory of 2200 4480 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff964aa46f8,0x7ff964aa4708,0x7ff964aa47182⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2356,7068438291901911297,13595368994666968401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD5e6ca411f8e4a0400f795b4fe9b5d4746
SHA1737cb38f285f6521966588668933a84c27bd731d
SHA2563cb6b84f1e36e35250ff3ab8dee9d8b323d513c9f28691206198fb19aea3dc03
SHA512ec86320f0c115238b673d5e6598f40467502b169b79f950553fad3f859c131db74a2e3d4c765041a717a0707bb28fa2434b2209c5e44d6989ace2dc503707740
-
Filesize
6KB
MD54070ba2db503e338fee6cc590b703c4b
SHA1b9b62dc0f961cfdc26b8da17362025ab47c5b9e0
SHA2564765360bb3c30dd810ca556b001eaf4e1ede88848ca27af7668a124ab15b158a
SHA512494df303695a0da9875975b06839e66a85668f3ae5176de56d77ef9e3889765e77f895a6a86e44c9587b65b43070e10631804b9efc07a752b2601a274c4a23c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD583197b3d8d62fb603a763bcf375abb96
SHA1901e11971d08b566330fd18e82c07ee78d96ecf6
SHA256c13fd4851b43c1e10b381286cd9090d6d6512e63cdea25ae45b375c60787404a
SHA512fc8c3bb1705cc1a13d79476f05d7bc61da133df1b67dcda5b81a7eee8e9864c4594a40612ca1a56234882eb4a4d0cdc4256dec6f793122a7f10a8d1d5588159d