Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
60106607b55c886927cd7c342079601f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60106607b55c886927cd7c342079601f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
60106607b55c886927cd7c342079601f_JaffaCakes118.html
-
Size
3KB
-
MD5
60106607b55c886927cd7c342079601f
-
SHA1
e26776210993b1ebae8112967b279010d02b9556
-
SHA256
7a12c6694f87980ae542308d651b6653cf0bf6489c53672f27112f0ecee1e436
-
SHA512
88adb595713c883ae604bc24038ac6945d9430f720f84ca917ff57de6e6c96530a1dfdcc86774bbcb5219e4cb8a148132f8ddfcce37f73bdd8c5bd6309afaac6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 4804 msedge.exe 4804 msedge.exe 4212 identity_helper.exe 4212 identity_helper.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1016 4804 msedge.exe 84 PID 4804 wrote to memory of 1016 4804 msedge.exe 84 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 1244 4804 msedge.exe 85 PID 4804 wrote to memory of 2708 4804 msedge.exe 86 PID 4804 wrote to memory of 2708 4804 msedge.exe 86 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87 PID 4804 wrote to memory of 5080 4804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\60106607b55c886927cd7c342079601f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbb6046f8,0x7fffbb604708,0x7fffbb6047182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15108255561594305628,15264752040061912737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
5KB
MD5ce534ffd676ca1702304faf9a7e9eaf8
SHA1dada81786cf19c310fda0a2e1bd68613ef5a9b3f
SHA2567fb230bb5b3e136583b261d13df542a2c147b7aae26cfa63e66c6026b59c050d
SHA512148d218ebe57011d669c871fa00df8c56f3881aa68bb70f820025328af9878c02e3545af7b51abf853926f18ec1f4634581e18d6a310e7b4445b83c6eabea1a8
-
Filesize
6KB
MD5ddef59249e7cffca4fdd1f8c5073e8a0
SHA14386df2da306712eded2b440c2fd5f2041e271a1
SHA256079cdf1928efcb59c3fb8a0d22f0bca14a6950de7540515a579301facf045460
SHA512d98bab19b62bbd321ded5984cfe26f8406554b1cca88c7ffde54cde098f8e101ca8a98d33bd1ab25fad27b746c832c61b6e332fb1a6691c5be5ab5956cc79248
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD558c8d67f14acf97950a2e4671bda4ba6
SHA1d4ac9479df1849cdc051daec6e3719725bacf8a3
SHA2566b1be11d7ca465310df3a7afe95c68e2e83f5ea0a8ecc2b8c74a299cedd2517d
SHA512df50ee47f459f3de63ad644732bf6eeee892a44a8adf5756e0c495107076389f7aaed64cd490deb0e20a4ebf94d0ab700982de28d2198486a03ca553629743ca