Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
-
Size
125KB
-
MD5
d073ceec260271858e44bcb392452e36
-
SHA1
6b3db61b1b9ccf07d4859f1efc2b7bacf2c4307e
-
SHA256
1fa82a21bc9be5f75efcba1dd53ca20b7fcaf4cea371d88ee6b09183eff90251
-
SHA512
7ab82c3ff96258c3117cfc552b3c2298e464988fbb847424adc88b8d42f5999c178e356ab6c182bfe04da763536768d6453a22437261c1ce43a86b7f145c92cc
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dB:Sv+yfkMY+BES09JXAnyrZalI+YV+4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 1636 msedge.exe 1636 msedge.exe 1224 identity_helper.exe 1224 identity_helper.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1176 1636 msedge.exe 83 PID 1636 wrote to memory of 1176 1636 msedge.exe 83 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2536 1636 msedge.exe 84 PID 1636 wrote to memory of 2848 1636 msedge.exe 85 PID 1636 wrote to memory of 2848 1636 msedge.exe 85 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86 PID 1636 wrote to memory of 3328 1636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d073ceec260271858e44bcb392452e36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb70f746f8,0x7ffb70f74708,0x7ffb70f747182⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1027501399391841955,10899229576805085785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD558a5859d1f419c5c95dde511ce4022c8
SHA19a296601bc316495bdda7483cd958e342536dd30
SHA256b6eaa43036453214e605d0731d1a43a11efce5160c872725915a9f880339045c
SHA5124f3f03369b3eb7c98d94921171e91840bda2fc6f60274a876a23682cf891c78ba416c0d3ad70c1d2262e4c41a66a48320614af62520ce201c757cb8fd435f436
-
Filesize
6KB
MD5c752257c65feec9064035cca9df64c19
SHA1bff2c1d5a38a1de10ba8ffe20b8ed0b2f160a533
SHA256434f9d0d9b341bda6586f9e5629104b09c4902adbe19f0f104098c282bd313be
SHA512a68d57df9009d115c90ac543293036ede59b06ab2df168f045f425b71772640b5e44b65a2fa5f0b55085a11ecc8e9a8e3a5242afb843cf7214e07fd796d2d3af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b1f44113859e9c5dae67ee211891eda0
SHA19315ce71d23a6ea786b38ae6be08cf4a3f5bcb95
SHA2561bb69da8b6cf473bf555a99517b3f25298a143a26bbea1d53155641a329ba6a4
SHA512ec2b17e887503c0a81a422a4e0fcae8bf7d20961ce9a189c0b7396cebd5334d0ba9675f46309418c5e3b502d6421ec3a3aec9ca0f454612a72b7ae2e0c8e0023