Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
61d4442ccb308a184cee16b825eb2957_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61d4442ccb308a184cee16b825eb2957_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
61d4442ccb308a184cee16b825eb2957_JaffaCakes118.html
-
Size
37KB
-
MD5
61d4442ccb308a184cee16b825eb2957
-
SHA1
9f5767c0ea89baa24a5f3647f31ff97512076a60
-
SHA256
2c6f13542ee0e19219f3e95b9ab7c1b88f3615f80c5ebe344d73bc3bd3b38e10
-
SHA512
0f29d2c4dda303a360d2a622785b116920d7e6b89ca563168584f87afb7504b21de35221147e8fe97a5f5cb55b8135f153d461fd5648391da6b37cbba9a6b6ef
-
SSDEEP
768:Frbp7tiEq21ptIxuiQ2MKNQbKD/my/XwGhuWyd:VZtiEX/yQLs/myfFIR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 3672 msedge.exe 3672 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2384 3672 msedge.exe 84 PID 3672 wrote to memory of 2384 3672 msedge.exe 84 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2064 3672 msedge.exe 85 PID 3672 wrote to memory of 2320 3672 msedge.exe 86 PID 3672 wrote to memory of 2320 3672 msedge.exe 86 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87 PID 3672 wrote to memory of 2032 3672 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61d4442ccb308a184cee16b825eb2957_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e6646f8,0x7ffd5e664708,0x7ffd5e6647182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4464 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3782403765756471126,2153368727523234468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD5e7419a5646e57cd5bd93e3005bdd033b
SHA11ca99a3d725e33407769fd7f7d4b892b89bc0a5a
SHA256416dc602d53d1bed6740486a2fe0dd4d02391d8448be12d1be5c656698c8e959
SHA51292ae9d90b0e540757259206622a50530db1289bbccfc01bd42a0053fad8e9a2ffe349c4da0ed197fdfef3599400233d5d269da82fe5c63c17597de4733f30730
-
Filesize
5KB
MD59f047139728deb1c217f64d0da8111cd
SHA1b70b13f6daf4fa66ddfbf3b7633f877caeddeb09
SHA256488c94f530b1c4d81d779b13a154cc07e77d4fcf00e069fe592316ad55973d8a
SHA5122d4638188067d0db7baa3c9ec69f62ce3d63928c658e263b8aa5ac7fbd7eef728c569b2ad0601900aeba9d545eaa679364159401a28a54529fe9ec6d4e3b2abf
-
Filesize
6KB
MD5ca7c50a03a84ede3abc858cabc6e4aa5
SHA1103c9b90127dc51945d7308c1146d33e5817dc1a
SHA25673424abffd3b8fccda623e38203d4ec11ae6b417fabede491df225e15dffb045
SHA51200b0c0893d3f46f25a83d9ab18bfe58bcb276b46118ccb96f329449ffee335760dcbf30ba86cb34671b095da8f4756753e9128eadbf87c1234acc77a78154301
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5b0c4b661559f802a5ecd7921fe350013
SHA1c1a236df17c9262a66ecde3e4a1e540453d20c0e
SHA256197e85b34d71c70e0484312044f956f7c7dc4b1efcc7b486481f74348cc10597
SHA512b109f7400a54594387eec22ba80e8cddfe06d497eb7acea18a6e808610a8af39172836d7fde0ed3c39c364788a4f60a361716d89b4e563068a30140d91e1956f