Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
a049d87fd86a1c32a448e15e1e83a6bf_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a049d87fd86a1c32a448e15e1e83a6bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a049d87fd86a1c32a448e15e1e83a6bf_JaffaCakes118.html
-
Size
51KB
-
MD5
a049d87fd86a1c32a448e15e1e83a6bf
-
SHA1
344283e018299304c5155015ec8297b84c894271
-
SHA256
9541fb83fd48346af364b1420b6e772f19fde1cc245fd94255764bd4d8f3c32b
-
SHA512
03f7fd80599eab172fd54aae31cd2cdbea49781e4385c22c68646ce89bd25ad559794be76b4e99799f1b56368958468e1aef22ce1c2a86e704ab8e0c1e4a3f45
-
SSDEEP
1536:Ss37hotdcg0Y1QwPdhFzdMp/Y/Cs/1/1/1/1/P/1/1/1/1/9d1OSxTe3:Ss37h3weyCuppppnpppp9drx4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1380 msedge.exe 1380 msedge.exe 3120 identity_helper.exe 3120 identity_helper.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4868 1380 msedge.exe 84 PID 1380 wrote to memory of 4868 1380 msedge.exe 84 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 5112 1380 msedge.exe 85 PID 1380 wrote to memory of 1440 1380 msedge.exe 86 PID 1380 wrote to memory of 1440 1380 msedge.exe 86 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87 PID 1380 wrote to memory of 432 1380 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a049d87fd86a1c32a448e15e1e83a6bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6cbf46f8,0x7ffb6cbf4708,0x7ffb6cbf47182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,17351599237644633537,4356292988146116993,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
470B
MD5e31a0a430123f3bac98e009c6cf2bd69
SHA1f688bdebe3b5095eab92d280254066ef4c7c5f11
SHA25694609595c85d02f0ace38b2b292b7ca11df5b22ce371b6927c73af70d1f15e57
SHA5122009308d64dc3720bd2f0ffb4af9b59ce217325acfc44ff36aa6909b0444194f36be46a3954738ccd1841af1d8fe544879a11ab325b090b121dca01a906ddbd7
-
Filesize
5KB
MD5cc83707d28513fe8a6258f1e4516fead
SHA1ebb9a9a26b0223a58f915813094e1c89847da96e
SHA2568858dbaf9401e584f8a63a65a0e6d941d08e4ae8d24dbf32f2bb0d30e1159aed
SHA5123af9832a6a15cf542d1be40eedf2eedf4a6c606412b2d94503a5b117361389a285c64b541033d446a9dda2f0a505e1b6a73e0a0be4553c9f96b1b4fb5ac533e4
-
Filesize
6KB
MD59af422d1ca8f080d4326408d44107a51
SHA142976bdfa4265d888cc5507325314d8961542fe1
SHA2565d03bd9adbb69376030b9b6b99fd86f604f9e87e1946ff1525e92ba128e18f08
SHA5120dfd3bd39b55843ee1ed98a9a47f970408acc3b4e4b4ab84e1c13acc607460064ccfa1b9d2e93dc83ad7ff03414bd0f2fab5e85d6f6ef7e37810c1ed2056c917
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5764dc0b0e938c4c9bf959bfe2edd5a86
SHA1b03fe539a6d467cba97ded5be6b86c59ad5e26eb
SHA256b618ee8ad6be485571689add2c3f1d4ce5a5288d59617d7bedd67e385cd48f50
SHA51269353a9ae56b2e59847540403e63d532c018432625fe2bf90281c7d32420f4b8d87d375b0d94ac9f070fd9cba887a4407d4383e900105a01add028bf6424fc00