Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
a36e66d6675c130c0cee05ca8d88f3b6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a36e66d6675c130c0cee05ca8d88f3b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a36e66d6675c130c0cee05ca8d88f3b6_JaffaCakes118.html
-
Size
211KB
-
MD5
a36e66d6675c130c0cee05ca8d88f3b6
-
SHA1
8499d83273ebd9385e31164c0692ad4124289f75
-
SHA256
2bce162ec20e3856cca88018ecd2a1cc1e038489f7e77895b50f8475e876b853
-
SHA512
1d22d85a63d920b8df5022343665a01765ae6bf22055c3ff992072a5cc4ec6f9ba0879c058a8f859b0d589211ead6a89f0e2f56ba8fd2ca35dc1e6c178644791
-
SSDEEP
1536:1nW6p9lAirrn3t4N+ks0BA/qveHq3FBF9CegM/RDVY6ihWENFz4IpfZC8KNXHjar:N/Aiv3t4Ni/9deff65DfnLL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 4800 msedge.exe 4800 msedge.exe 1796 identity_helper.exe 1796 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1432 4800 msedge.exe 87 PID 4800 wrote to memory of 1432 4800 msedge.exe 87 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 540 4800 msedge.exe 88 PID 4800 wrote to memory of 3776 4800 msedge.exe 89 PID 4800 wrote to memory of 3776 4800 msedge.exe 89 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90 PID 4800 wrote to memory of 3580 4800 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a36e66d6675c130c0cee05ca8d88f3b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc538f46f8,0x7ffc538f4708,0x7ffc538f47182⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3254280720499593921,10471650634434986522,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5afa8e094ce851a2232906fd9a3b60356
SHA1f8a551a8945a4b835276a8788beb15158f88cae1
SHA2568f8bc4b2be2af57e8a014a95d29cbcc6cdb5828066e1d55d476fb487873d2555
SHA512f462f26e5f65b4fba174b22d41c96dc88c9d6d1f6695949dd392c960da133bb97fc84dac2caf920c02e97b2f23978dabf20274a35dd77c09735562c1d81cf688
-
Filesize
6KB
MD5469709ac14de55637a98314b49e79b22
SHA18c31e102e7cf62952621c643dda082e4706fc37a
SHA25676a65620143014cca1b75a73f6100c9a5f7fa933948967bd0cc212b083023e09
SHA512196ac9c71cde2a987ff5b340c49f5738d2ef9de09aee1e014b55d0295a70fa5edd367edb2faf3cbdc2195dac8d0c5b2632951ea5369eb10547f5e8b66725ea4e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51fad2eb338e186c5d7885f2d02abdc84
SHA1aa45ebe0ba595871de90dac97094058d8e3695c4
SHA256ca9e98cb2dcce34ffab1da57aed433bcac00f909640caa931a8e41cb9809ff4f
SHA512df5339b78b009b3235b9eb3daeb29a8d53be40a9a33e1beb0cb1fbe389f6ca21a258a6120f92e15b0778c41b616cfc41a24617be072ca256192f3efb45b43bb1