Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
bf675f9b4184c330027346d571ebc749_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf675f9b4184c330027346d571ebc749_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf675f9b4184c330027346d571ebc749_JaffaCakes118.html
-
Size
460KB
-
MD5
bf675f9b4184c330027346d571ebc749
-
SHA1
2b8b8e0978178ea80120378ebb78f51f675d1b9c
-
SHA256
e4162456e8fd76786390daa42406b65f9528af7458ea60ed4f92bd09c3d01c97
-
SHA512
95d884b6cd6db2924bcda8f97cc1fb40da8fec66768eadf323f17bf5fc79222a834dfbf41c74697b454fc477961e9a78ebd710013ed1821714d422ccfbfd5070
-
SSDEEP
6144:SRsMYod+X3oI+YLsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3R5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 228 msedge.exe 228 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 4680 228 msedge.exe 84 PID 228 wrote to memory of 4680 228 msedge.exe 84 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 940 228 msedge.exe 85 PID 228 wrote to memory of 4140 228 msedge.exe 86 PID 228 wrote to memory of 4140 228 msedge.exe 86 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87 PID 228 wrote to memory of 2364 228 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf675f9b4184c330027346d571ebc749_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8078f46f8,0x7ff8078f4708,0x7ff8078f47182⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14639677005278661445,6231103508562243039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5e65b27c3bf94742a31fbc157d8d92f7b
SHA105ee0bb5762143af28ab1c0fe1efb24cf0f9de5d
SHA2563d96d71650748871d7e3a240358d7db9998ef8b4c047f57d5d1a41e5e770e883
SHA51211249b6d56b1fc4e54e9c5a9acc2d3ddaf57974178c772a610452a311de246ef848a882e00cb553bbe261c0bd7c913c0d1321d5970dec4e6b70fd3aec45af1c6
-
Filesize
6KB
MD5f92981519f7d1e68e62d9bb0bd543c1c
SHA195897bcdf292f6330af0d2287d030a31c6293ad8
SHA25624fb9cab152e2c291bb09a3f2d4d7a1c6a6ed69803a2585d15d6fd2f27c8bebc
SHA5120533153e9c86cbb853cf450ac69899f50e1fa3eca3bbcced150b8d2e56a92902c64e3eb00f5a03701c87aa994e07dc867a3a74aa8ef172b7ca714b289966696b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52870ab3a953e5e477c34e8a852804aa2
SHA1c8f2014a8866704224b4de1919adadfb2ec63ae7
SHA256e411306472aad1fcbcfa997d9a2abb8f02a62ddd28d74e586c4d467ae60033ab
SHA512430200bf54061827be3e18cc3a7cca0b082de0464e0c06540776230a566d5c1e0c07a9f6a9546580249400c44cbbf9fcff1ebdf240a909ba0f4c9dc4e7c25fa3