Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
d26591259bc58149610be8eeac95782c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d26591259bc58149610be8eeac95782c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d26591259bc58149610be8eeac95782c_JaffaCakes118.html
-
Size
36KB
-
MD5
d26591259bc58149610be8eeac95782c
-
SHA1
2ec03c4ae5653b6ed3ad0cbe69502591dcd65d19
-
SHA256
09ecac825422767b067ff779db76a18e2a382fb2b539fb2119cb9ba1ea5b7177
-
SHA512
9be291a2b150fbdb52712d49bdfc28adaa8c18e5cc981fe406aa569ee3a8d90074811b4ec8d47a0f24098cb7af12577ef39b0b0feb701cc1908a953a1d2a8ecc
-
SSDEEP
768:zwx/MDTHpx88hAR0ZPXrE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRC:Q/HbJxNVNufSM/P8LK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 4644 msedge.exe 4644 msedge.exe 2252 identity_helper.exe 2252 identity_helper.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4612 4644 msedge.exe 83 PID 4644 wrote to memory of 4612 4644 msedge.exe 83 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 1088 4644 msedge.exe 84 PID 4644 wrote to memory of 3944 4644 msedge.exe 85 PID 4644 wrote to memory of 3944 4644 msedge.exe 85 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86 PID 4644 wrote to memory of 3224 4644 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d26591259bc58149610be8eeac95782c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe80f946f8,0x7ffe80f94708,0x7ffe80f947182⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3592566934530502145,1332109548071290405,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
614B
MD5b489b9e23f8ea2fc12c9b6ba231b15d4
SHA108a1fe614ad0b233e6f20969cce61cc19f107399
SHA256f07a02ef9072d149c593e22e8fbc51f9a564ab973b150d85009059ed936e2d24
SHA512473a57f4bd14b4c9964b4c2bbd01dd390adbd1f1f8fd462fcb3e8408a9e5694a6d045fdcd26a6ea3b5acbf36faff3cc7f4e58bf02cd2ec97b6aa9c9273e2239d
-
Filesize
5KB
MD5ba439fc4cb2d7b503ca74c680b360568
SHA1eb0eb84ef7e57a93a4b3178ef814210d02550f38
SHA25658618e32f27e3b4d9fe3e438ad1e511a276ebe3a681fa63987cca29fed823cf6
SHA5126acde9d2020eaac6f2cb5a849d6b5ad44050443340640866c3c361ac2784e636d4a881feac553185253ff6667de979849e7ff2cf3e62376ba3cd2ffb53879483
-
Filesize
6KB
MD56b5c7ae85ec3680ba6cc6fe777d83a41
SHA1c86280d05457f9163abcc516192a26a2d7545441
SHA2565ea5b099f14617fbe0cae5c30ebb4afc7da805d64204a293e3782e65a33b4c0b
SHA51294d82562262beb1e70ecb910aed058fea0a5894b3b8d461f107aab478bc4791a9c88e887cc3cb5e1721b00d66511791afb8af653118608725e16a7a11e2b2e2f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c1b317ea4e2748cf7523b86ced04a24e
SHA1fcaaf40f521f2e069ef544d58311e7c5d07df9e3
SHA25694b4ec3e3805a394acac9da07ac8b6816266e6870a438522f420057694332e7f
SHA5126066e31250b273ca108f23311bb3657e70b3d294d2670dd0c2388e4c06b105bee019d1882ed9b2693c2c8530378ebbf6e40f870631b7ab1c764d90c86335c339