Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
975faed86d60cef27378dccfbd359777_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
975faed86d60cef27378dccfbd359777_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
975faed86d60cef27378dccfbd359777_JaffaCakes118.html
-
Size
27KB
-
MD5
975faed86d60cef27378dccfbd359777
-
SHA1
7dcdaba533eb2341ba5233821d0283698ece5ffa
-
SHA256
a3128ad75a2a43adc1e0b128d3a64bc2c91810dcd0845c4787296a04c8f7c320
-
SHA512
78de37e07233ca0a3f15f79e6754230102bd463272e0dd2ac9d64183536de4cd8b93632a606298a66f1e5e508ac075562ff0e4aa84c9f3e53aa8d7851040140d
-
SSDEEP
384:Jh7n24tQBv8kCYGDZc7uareXab3uov1LxdaDjcNJU:Jh7n5QsnDZGuareXab3R70cNJU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 404 msedge.exe 404 msedge.exe 1276 identity_helper.exe 1276 identity_helper.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 4116 404 msedge.exe 84 PID 404 wrote to memory of 4116 404 msedge.exe 84 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 3964 404 msedge.exe 85 PID 404 wrote to memory of 4536 404 msedge.exe 86 PID 404 wrote to memory of 4536 404 msedge.exe 86 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87 PID 404 wrote to memory of 1004 404 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\975faed86d60cef27378dccfbd359777_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13100708817112783005,14882182483857607228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
587B
MD5ea5c43e9ec8bc23ea2bc503d89cddf1f
SHA13ddeef78c218c642e49a2d55507314ca97635e80
SHA256c6c109255487d597ab848bdcbbeedef157e112485283ff8230e135a3baa9a9ba
SHA512f69e9d4b264a1e3623a89bd9571b8104aacc2dbacbf21f0d964c3101fc6e0a22ae9be26424363dad66f444e2020bf08a1c83ec3596bc58ffa591ae18b90adb60
-
Filesize
6KB
MD5230a7531eb7eadf65df20ac8693f3902
SHA17ae5240768a547df5e5d6c51d7acad964705ca1a
SHA2562aed8637938e244d25c40732ed5958940e74f2328cc3a903f7e733f293d87a49
SHA51214b4d5eb68d142a9bfec8d024dd669835e6dbea0bc7e935f60d0b906414c93995a01b20c4d51c656e2867f70a69448b747c1004326a8ce0fc1973562f65c8728
-
Filesize
6KB
MD5a0ae071351445b7ad8ee629f1e6680b5
SHA138fba10a52a53dec62a2a7628ee8e2fe27ff30bf
SHA2561ef2c8e8c31eac2a62082016ea8f9a441680d3a7337ff21011466e27fe8417d0
SHA51229d3d5196c5297a70d2bc9fd1b145cdd2a0e213d8a1a1721f91be78d68bddc16688f72e1e0568f2ed21d7e8cc640851879ec0f6a47b1760d21ef51896d78b9b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e9a88f7dc0fd867ec83941bcca84d14
SHA10d380017e1fb7592240800abebabafacaff3f4ea
SHA2563247ef1402b6ef2980a0aad233b8d50c4aab41c2414efc8bf8912640dec72ef0
SHA512fb2a215e1fc8af6f88e958639a334f0bfc62ca1e11329bda2fc6ca9661367332a4df3bc81e1bd72b65fcaaa0ce1154e01c258cbb87103ffa60eb988a228f3edd