Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
-
Size
1KB
-
MD5
6fa6d8419c6141a013c32d54de73a21c
-
SHA1
30461f1311bcd9a976d54f4f4f745efab368cc20
-
SHA256
9f7755b93a154263b2489424220e06a92a637edb1da7fe5d45ba27470c7f00c2
-
SHA512
b2e98e5ae0e927238b1484ff24c184cacf42a6be41ef39222eb36aebb04c6c1ca076fb9cc5766f4df0a12ff66309115ab842a0b57da081ebcb08e1e46fea2912
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 3596 msedge.exe 3596 msedge.exe 2564 identity_helper.exe 2564 identity_helper.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2428 3596 msedge.exe 84 PID 3596 wrote to memory of 2428 3596 msedge.exe 84 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 85 PID 3596 wrote to memory of 1128 3596 msedge.exe 86 PID 3596 wrote to memory of 1128 3596 msedge.exe 86 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87 PID 3596 wrote to memory of 1664 3596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadb1c46f8,0x7ffadb1c4708,0x7ffadb1c47182⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5391977845909227617,15092927121601285102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
5KB
MD5ce4e66efec4ff004ef75eb18a8717876
SHA1daf6965d68418128a36986bb306436d3c4c99a85
SHA2562180f2b8e38702126fb5a3374113365893a19fc491de1f31e17026a19d818b57
SHA512751148410d29d2f4c2984d719ac1b86c7d56a3bd643162b838ab0479cbc1b83c4985e05e0cdd482678789d139c8cb7b5ee1df66b20ccb7e0e9f64ca4d8cd855a
-
Filesize
6KB
MD5dfa730601fdbfc33b7df903247248e78
SHA16a9d83c26dd5ddf93306658f6d117d6f879dbaa2
SHA256cfe686b471462886a5de0def4d31d8e9ad77638a9663d105a84be36a65d0a9cf
SHA5121befcea33ddff91f98e55e6ffcb886208fae1111d9da7f9e8fcce52d3d724b84a8c21a0703b832e99bd2a4ac08b9085023ceb606357634974582c673c02d9138
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52120abdddc77d2c6bc045116f189df17
SHA17ade9d0185306d07871d018de6ecce21738ee59c
SHA2566066c5f4f9617d7df2b9e36c81d84f2798a108328345e6852475ee690f08b7b3
SHA512946a1c03501092b01bdc8427038ec774467f4946d277bbf825c3e85850f3fc0f35beebbc302067bc0a8f2ed4e5a1ebb2d7d8a77c9c70651352eaa884d2acab72