Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
-
Size
6KB
-
MD5
ba2593d77ed98eb58cdd03c6c8c24613
-
SHA1
44238bdd62bb018b43aad66ef46e54cfa4c4ce1d
-
SHA256
eb1ad5538f180db8d9e522cd8521e37ca94afe4812f1f6404ecabaef88bb2c9b
-
SHA512
0d63c441e258dd1f579a56d3a057f5e200f5a076ca3f23d86d86c54482b9f69e0ab62bfc52fa971efef17f1976525c27f7055ecdf8921247401634bb4812c254
-
SSDEEP
96:uzVs+ux7vdLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7vdAYS/xb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1624 msedge.exe 1624 msedge.exe 2644 identity_helper.exe 2644 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3872 1624 msedge.exe 87 PID 1624 wrote to memory of 3872 1624 msedge.exe 87 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 2240 1624 msedge.exe 88 PID 1624 wrote to memory of 1028 1624 msedge.exe 89 PID 1624 wrote to memory of 1028 1624 msedge.exe 89 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90 PID 1624 wrote to memory of 4184 1624 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7993928567486107932,6257266560632107555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
5KB
MD5badfb2c0bddd53ece01a4cc3251d6cfb
SHA14f0e8a8d1f6625afc52b3abfc7487ed7a5759cd4
SHA25612869cf34ce3132722ad0aa8957ad200dee37a85c5a29a75ba1806fdb019fb77
SHA51286d72a0ce74d8ef2535417cb01d8fa1aa8ee1da35772ae8e9dec8bbae363c5b879088387ec4787cbf7459c2b4336d838e711505c746c212685ff996f92a42539
-
Filesize
5KB
MD530a94f221eb8c43df33e76bda6348655
SHA116c64bfc8aa3903051e1a08e713029be98c8c4c7
SHA256e713af2ace5e8e9d0c24913e2f3565b618f9ec55593db602592801c201adb25e
SHA512b8c72b46cccfb7e38ea553f17c1ebc7a4d697fba4b8e7c924fb12a36e1ae128ea1c840fc6328bd8c0d53fa347d3b8fd0750ff688f8dddb91487cd437dc6f1059
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD565bdbcd39fe6d48e162136bc4db6a27c
SHA18b45efc7702969097edd0829ed5ba8be3a0a5273
SHA256b2bf59800f15aad4357635db8362ad805e2df2be26a2addb402f14a04fe1eaa0
SHA51235f2987f54af8dbe96fdb88ee72f281ed7ec9f2fef15c76c152b3dec47ab779510f327b7f36fd885c8e5417e8aa34bf327febbbf46e9f461c465a3164753ef48