Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
-
Size
6KB
-
MD5
d1e828b17e6b5e755a65643a687b3031
-
SHA1
eebe440abaae1e7d01a03cc2a66d2204babab9f2
-
SHA256
c9f9466031115a8f70644d67efc273e9a83feed2f2020be8581bf54163db11dd
-
SHA512
3512303e66665f2daf52cb4286c62fa10647eb27c18d18d4240ffc48f948ef54b360917a668ac49e5977dad62c9272f75da5b886e65c2c72d2dc285cecd0c597
-
SSDEEP
96:q9fwOc0FBFeke0f4ffmHxoCsZ46eLvRzflQNOvcqZOvkktifIIRxwUbfsS/+:ufwOc0FLUmHvQOfZOO5R9zy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 772 msedge.exe 772 msedge.exe 3840 msedge.exe 3840 msedge.exe 4508 identity_helper.exe 4508 identity_helper.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3576 3840 msedge.exe 83 PID 3840 wrote to memory of 3576 3840 msedge.exe 83 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 2396 3840 msedge.exe 84 PID 3840 wrote to memory of 772 3840 msedge.exe 85 PID 3840 wrote to memory of 772 3840 msedge.exe 85 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86 PID 3840 wrote to memory of 3100 3840 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,8062505445905086657,9076124474011578006,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD58904e98c7ef799d5b155b9eedc82549d
SHA1c6cfa35dc8b5eaa433bb9fb2646fb4ff1465ae37
SHA2568242d9ffc30323d4118a5c97f8369bc1f5ccc7c0c4a3c30b9ddf3920f91fd5ce
SHA51226aa4194a241d52be5db7cab1783457de8fc25ee43d71d33ffa9eff5c5f42930de0d14a9b6284077fb13d220f56ae27cfee448b04def3ef66bcef0bd2c6a2b89
-
Filesize
6KB
MD586984ec8f1243556b30072d5313e1c14
SHA1c44714016bbd91ef391c817d50d9a5e3816f4ade
SHA2563ca7abd4a58354089b2f3f1d996537e797585291e5a59ecdb639a6e4d47068a8
SHA512d69db48fc5d674ca3036d8ea5ac1b10dcd208e7829e185f9fc8eb3bc5101bed737393130ac88e3963d751de34491bfccf46e530b8d0abe41b615f2d0d3de258d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD537bad77dcf4fd8e0999e4cbd7775aaff
SHA1fe93ec6c5474e945989e147c24804927033dadf8
SHA256af285bbef669d847fc32f601073750e481d31fb1d5fdc1004b2986c7b6c278b8
SHA51241b853e068e776f527652b44f133f6f7aac86129dee38169a8453c638ec4b691b1b293e73878d1f9b31ec29d60553d6975caabd788e0e76b63635f340cbb6982