Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
b9369763e871548ea44ca685310f2546_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9369763e871548ea44ca685310f2546_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9369763e871548ea44ca685310f2546_JaffaCakes118.html
-
Size
485KB
-
MD5
b9369763e871548ea44ca685310f2546
-
SHA1
1a7cd10c5a9c4f55fc95550ca118ef641401ffaa
-
SHA256
6516a8c6c590b2ab47a5ad6ac18a63e463436f9b173418812f51f0e3c633fa0d
-
SHA512
1185e99922161f469409a90094fc0bdfa504b3d67060cafafc102a917a6e387df7c067d446944bcbfe4e0a3030a3f68d0ef46a63335863d2898fa5b36796b1ce
-
SSDEEP
12288:oa2iGiTuS4SqnHA3etJwmGiTuS4SqnHA3etJw+NExNErRPzRPPY2c70Y2c7ycr/p:oa2iG/S4SqnHA3etJ5G/S4SqnHA3etJ8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 1260 msedge.exe 1260 msedge.exe 736 identity_helper.exe 736 identity_helper.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1296 1260 msedge.exe 83 PID 1260 wrote to memory of 1296 1260 msedge.exe 83 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 4056 1260 msedge.exe 84 PID 1260 wrote to memory of 1836 1260 msedge.exe 85 PID 1260 wrote to memory of 1836 1260 msedge.exe 85 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86 PID 1260 wrote to memory of 3976 1260 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b9369763e871548ea44ca685310f2546_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2812 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1575054714468448825,11010413728338062462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
1KB
MD5e08374ddb9140ae532ae4bf26b51397d
SHA11fff7ac783386bf7c6972264cb7e06950242b997
SHA2562ae40768d06967ff0767c90212f1be60d8a55d01cdb6d6e7f81987351cb2ec3f
SHA512fdd21b47ef6ace8f59c06a3dea3f2fdf902c05bb485e5f8e6eb6d36852caf748772043b60468a96c950ce4f781976675f98c3e030f11770f8a9a8dcc38268554
-
Filesize
5KB
MD54cfa48c0302866e0a1c8bcd176c85605
SHA11341b4c5c9579842c21997beec63bf79953b212e
SHA25685597db80e1488e35f73c051741fb8f2e05b627e65dba75d699adacb38c4c9b5
SHA5128146b0595b67511751bcb16745436c6d7dbbd0f8d87509f6abec8357cb38dd7bb93c06181556c890e6169367dfb2a2e0cfd9323ac5e29a5c41133e3004f235f7
-
Filesize
6KB
MD52c48c10713c3a66f41c6904c76bd047a
SHA1274967a38086d68963ce6b25378cdbb28e921481
SHA256096275211b3c26e33eaed3deac401f07229b5df6d2ef9f03897d59d05fa89caf
SHA51270c2c2e0df39dd66956701366beec344c171605604b70f1afa0833fe334acbcfa5026fad2dbdabd6aa80b2ccdd7ea721681b4f24e3810deb930af727ffaa82d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c99fd950d7fa90e147c7c10995e3ec6d
SHA1097af9a16844b31e5d37df783a3eb52078400462
SHA25603028806351f4b0388c34411e1f31221c74361238605cd1e00c417c66b734390
SHA512a147d9c40f5c0eed841d467b9c49d0280f698d95446bdc606b2d4b0467621b0eef80ddeaf1adffd16b8a3e85d62153b4006dea4085447ef481869a608b19bc46