Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
6509b3e4139c4ea61666280e5a8e31c2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6509b3e4139c4ea61666280e5a8e31c2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6509b3e4139c4ea61666280e5a8e31c2_JaffaCakes118.html
-
Size
122KB
-
MD5
6509b3e4139c4ea61666280e5a8e31c2
-
SHA1
e703bf745882550ee2fcd4a4d402dc14069156e3
-
SHA256
5c4f6d36e086939878f1ced41f9c28cc63d434644bad4da2da83d70284fa3c47
-
SHA512
66f621734cf52979b777cc84dd7dc479b6be857ce88803407635a6b7f89aa84d1e8b1e5903d272f566a51665083d5d092ac365ffa130c8d55bb76c7d399cee28
-
SSDEEP
768:Nx/NfcDaPWcvFKYglvJLtFQPU6vO7rPC0LTIo1NejMYywhxo5iymtjXHi0Wp:Ntdco6lFvQPdvOfC0vIoeMaokympy3p
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3232 msedge.exe 3232 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 696 3232 msedge.exe 84 PID 3232 wrote to memory of 696 3232 msedge.exe 84 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 4240 3232 msedge.exe 85 PID 3232 wrote to memory of 3156 3232 msedge.exe 86 PID 3232 wrote to memory of 3156 3232 msedge.exe 86 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87 PID 3232 wrote to memory of 1780 3232 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6509b3e4139c4ea61666280e5a8e31c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff855aa46f8,0x7ff855aa4708,0x7ff855aa47182⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11096857512072545703,10104510929536463703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD5347004e01ad242ab8a7ba948090b6257
SHA106190f34e8ddc9657433839fc2d5748268af0e86
SHA25681cf26452623c801091cdb6a5ad3c57ce5d782d18a758dcb4fb910c756293903
SHA512d07afaa3bb6a4f528bbf232fc7bb7a3d3f7f3047e13dbe4ee1c32050973577a57ddf3cc4e7298f9528569037f1c78389753ece3b7c4b7b9c5d90bb8c27970d20
-
Filesize
6KB
MD56b1dd32d59f496decb2b92bfe24fb3fa
SHA103490e07dd9cf981488c6e746561acb8d7e7fb32
SHA25602cfe7cc9e8254fbcae438d13584158ea95f1050d6b76235199646d0b32089a2
SHA512c72b8202688209656562eba903f21dba92b3339df09cd5c6f619af5f7a9854ae8d697f226717d0cae88c89ec571d2dd7f4277b96656bc6cbdf0d4399e4a74168
-
Filesize
11KB
MD5ac4b7478a017898d9b800d0b1619b61e
SHA1d042bd49d145794bbb18351c3fcbcb8eba5b17f6
SHA2563c03cfed90e4752c3db811d5da2d0f09920e48beeb9be019d3b4f09aaa63cace
SHA512a022b39c11448c69f2ebf6c2955f76e13d7d6336394fb24b402c50fdaa8c581d216fc43eb1d2008378abaf6ba216cec4ba226c7cfa8c4b7cc33c9bb7e7fc84a5