Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
49b706c82862cd80de02275a6723d536_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49b706c82862cd80de02275a6723d536_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
49b706c82862cd80de02275a6723d536_JaffaCakes118.html
-
Size
2KB
-
MD5
49b706c82862cd80de02275a6723d536
-
SHA1
3c85ae7942ba94d47689d9ca91943cad890b4853
-
SHA256
125797b1bcdb8f47c5c6a62c12162b11c1f705ff7d4d92f923de890a51faa380
-
SHA512
136572a548ee53c12e38d56ce259d6dc742c3fe024eb23e1e9bcf08ddb05ee4a754e6b44477b40f22630e5291428dd3bffee133c95b3a941536ea3f9ebb46a7c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 1052 msedge.exe 1052 msedge.exe 2512 identity_helper.exe 2512 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4108 1052 msedge.exe 83 PID 1052 wrote to memory of 4108 1052 msedge.exe 83 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 3744 1052 msedge.exe 84 PID 1052 wrote to memory of 2460 1052 msedge.exe 85 PID 1052 wrote to memory of 2460 1052 msedge.exe 85 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86 PID 1052 wrote to memory of 4208 1052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\49b706c82862cd80de02275a6723d536_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8461446f8,0x7ff846144708,0x7ff8461447182⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,43235556915867809,7373814452135015873,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5457a65ba782ebb1cfa509979c93a0e19
SHA171135145da365178a822ace0b05217a1da598a5a
SHA25615aa4214653d207df90567889fc53d383bcc54e3f8f964a517902e067f565060
SHA5129cf93f6a5a6191d5fa72b1ed1089e058d9428797d292ef7195e1537257d6e2b6e9e5779832385c04a56ffdfc1bb81618cdf9e04a588fbcedd2d6b2ab68eb053d
-
Filesize
6KB
MD5a4c30d46a9b4cadc337d7d983d3281ab
SHA144cd2a31b478ef6ef1b6585c415f7ad8b0425f02
SHA256f31a8fdfeb9de4e09dcf27ff80e2a69fe17e1d5b806485a8275c4a0c2401cac8
SHA512a19258647dd9b53b92e7023476c62a43a99834f592917faaa2cd57730703abacb3e411af3bce569a5a7fa848f8299ce8a2bca69c24c1d7098315f050b592cf63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57852f35414b8b8309d53b098d275176c
SHA1b6f401ce90b57efbbb2473e6bc5ff07c72508d31
SHA2561c4d5316d5237ef9691458a83e997e3ec7ec74cf0e59a699e15071c7f90819fc
SHA51286eb87084f39606d415fc08adbd285daa9e9237723d34dd2090b2f21414507b378b44a1932901a8dbfd05cac90b7d05b03df00371d4fc0bf363b1b40c8079181