Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
d3260f177bdac0f2d632a17277219390_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3260f177bdac0f2d632a17277219390_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3260f177bdac0f2d632a17277219390_JaffaCakes118.html
-
Size
36KB
-
MD5
d3260f177bdac0f2d632a17277219390
-
SHA1
b2ce39e1dba0a5f9a36c5ffd89403be8eb40cfd5
-
SHA256
5112a3023df3a0eb46695b4f6b56eb18ab25d88fcb087f0ad194c303ce70ceae
-
SHA512
02e96722ca44c07c9e3405c67d3693c2cff72f9caf5ec222fb67995330499b5007998497b9f9d89c031c77e77bab8d8c315dab2295350b8fe3e74ed126fb8e60
-
SSDEEP
768:zwx/MDTHBZ88hARHZPX6E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRz:Q/HbJxNVNufSM/P8aK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 668 msedge.exe 668 msedge.exe 4304 msedge.exe 4304 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3204 4304 msedge.exe 83 PID 4304 wrote to memory of 3204 4304 msedge.exe 83 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 3408 4304 msedge.exe 84 PID 4304 wrote to memory of 668 4304 msedge.exe 85 PID 4304 wrote to memory of 668 4304 msedge.exe 85 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86 PID 4304 wrote to memory of 1092 4304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3260f177bdac0f2d632a17277219390_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10799550600581852246,5812857239618898120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
613B
MD5058d834a171698b38f19c4ba89af6847
SHA1c9b63abcdefba37ddab2cd5a364f68c6222e5371
SHA2563a901f736f9cff09b20e1e95cb87f9a939f8be4c69caa2822bcfcd990e57c3ca
SHA512b2605636caae42ec9ba0e00cfa176b45628b606fa44ec66664f5198c76e7d6c4515cb2f00d8491afd437e791195e1e35fefb79de16e2f46970f3cc8e66fa6359
-
Filesize
5KB
MD57f59918e7320c948a2e02cec9c9fa91a
SHA1cad41968b6415446537daf455a39ea5f7fd73778
SHA256a720d56d8be6336b18688e0640e00004347fb28568c43b0a61319d9bee0152cc
SHA512747f0b7623c0d7054f8db99e2beebe3b257bad2a79d76caa10923e88e4e7483d6c3b138b47f906f4212d36f06b80ae3ab416f86123bc54a39c4fe8383ddcae5a
-
Filesize
6KB
MD5ccb63a820d166648d4c355e4b01478d9
SHA14cc46566ab7439245a2d68207d1127b9267402c8
SHA25637215981eea06e35dca06dd90d9e43ed50a487c67bc206ccc0f7c77cde3c4a27
SHA5120604398c47ddbabf28f0f5ae292284051cfbef9d97438fe6d4580e36a907c911a27f4e758dba431b7fb93f883c267d9ba9132e98066e402d3282cffadef95acb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5123b7889ff9fee4137e8424eb71eaa6f
SHA15216ab2d58b9efb194b5afe0578bda78e28657fc
SHA256a41dd9b23cc4c43c42aa892f33051ce3922cf462ded1f81df857b5fdcef279f3
SHA512dbae25302e44bc38beeb89e768c2043fb033fb407e3587d9c25ce9bd75340b9ecaef5d563c1211dbba447cf0f4d030414eab234dcce58b3785d6d70b069aa77a