Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
aa40bf71b16ab067ab7c4daf6312623e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa40bf71b16ab067ab7c4daf6312623e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa40bf71b16ab067ab7c4daf6312623e_JaffaCakes118.html
-
Size
11KB
-
MD5
aa40bf71b16ab067ab7c4daf6312623e
-
SHA1
1076834bd11f8ce1c11cc58a5bdfdf39797ce968
-
SHA256
914445117459d7308d4077ad2dc92518fc8e42fac514c407469e82c68c3008f7
-
SHA512
f741ad8ab07f6857a75ce1482adc0d380ef937b415cd36c9fc3509d09399011f74f4bd3e6cae7390637c82f4bb51fc6d72382ee987d10c893c8e8c9a2998100d
-
SSDEEP
192:2V8lIsr03wx8k/w1wvqy5BfqnujdKKh018LOXuBuLbdU8d:s8lIcuwL/gc5BfqnujdKKh08LOXguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 456 msedge.exe 456 msedge.exe 1424 msedge.exe 1424 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2068 1424 msedge.exe 86 PID 1424 wrote to memory of 2068 1424 msedge.exe 86 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 3260 1424 msedge.exe 87 PID 1424 wrote to memory of 456 1424 msedge.exe 88 PID 1424 wrote to memory of 456 1424 msedge.exe 88 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89 PID 1424 wrote to memory of 3908 1424 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa40bf71b16ab067ab7c4daf6312623e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc5947182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5875440654633689877,9746926374729715956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD56a08e0bc9fc467b4f8cf94eb19276ae8
SHA126295ee71393b780860724af5683349e1810fd54
SHA256a38853897e0988b4c9319407fdfcba8288cc0da55cd1306d2816189f16938050
SHA51246b5686e91c06a2dc6d4c077cd9a533940849d1fe0afa16029bd750ddc620362e40a1ecdbd0722d01a1be9917d45c03539bd9a8426b112ae3232f88f4299e651
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5be62ae3241c8afe2b3934e03f4fde85f
SHA1fcf385677219944d2196a4dfb8a7f36c28f0421d
SHA256df025aab888da5371c72111f63fd6de106324ccbab35a23ef9dd04a3b3c265a1
SHA51294b544b525b2b85bc855b57ef7d78c62ef48af2cfcd2d2f699edccb41fb9c84527a4f6e9cdacf778ca3838cba0e4792d1a2213697f89b821fb7368e0f600a376
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5dfe8cf497843562e06145875dd4d54ae
SHA1e6593b016f9b0a65020612daeb5c667bf29a96b2
SHA256191e78fd1a4a503f7bc852a1c6ccab346b4b76aa9960c36305053543b42d584f
SHA512c60b0cb8bea5269640bf6a4f87f2b4efe07830359307bc73b308c4b1173c1049197c48990fdeee8b50afd59c2ea7f1124f0ac05e567b410abf127dbff924ca78
-
Filesize
6KB
MD57aa71877275706ba43122f086fd07312
SHA1a29a89071f4e8ae68ca32728850cbc1e36be68d5
SHA256ece39cd51e1252ad21bffc30adb41db043d1a6754ff050cb8cae68582331c01f
SHA512700f16c13885cd1cf78909f7c1b7bec9bedbc5e167538c2b09d0fb06127e100ea6e73a931d7a2fe16445a1cc293263172425cd219259bcc77f3ecc51f35de746
-
Filesize
10KB
MD5c966cc74e168a12cdf7f8ec8a20cc161
SHA145690b3f7f91374217eaba893f834cb509d27a21
SHA256daf7f676599de653a9caa35f816f3bc45d686c5df1312819bc896e3e0d267274
SHA51253f8af99f7345d14ec6f8c67ec0e901e828677c4a1295b916ff368b3c117f58b4f2746dadf7cd26c5a1822ead5d77cab5bbeddb278ad7ea5c1311737b6d73346