Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
d4e941a9cdbe8c26934873cac616d36c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e941a9cdbe8c26934873cac616d36c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4e941a9cdbe8c26934873cac616d36c_JaffaCakes118.html
-
Size
35KB
-
MD5
d4e941a9cdbe8c26934873cac616d36c
-
SHA1
f1f10a8df0532a63a9d9d718cd387798839f5ede
-
SHA256
894ce2a902f6054f518bafa242d35865307e5303cc0e020888b852c94164eecc
-
SHA512
db1adf373fef03b0e4b120ff4e0650303b2377d4cea70450d34dce24550313ff1718f1ea4370ae018802013cbdbea008c8b71f215e05f43cdbc75fd015d214df
-
SSDEEP
768:zwx/MDTHS088hAR/ZPXqE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLR9:Q/3bJxNVNu0Sx/P8KK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 1284 msedge.exe 1284 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2172 1284 msedge.exe 83 PID 1284 wrote to memory of 2172 1284 msedge.exe 83 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2300 1284 msedge.exe 84 PID 1284 wrote to memory of 2480 1284 msedge.exe 85 PID 1284 wrote to memory of 2480 1284 msedge.exe 85 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86 PID 1284 wrote to memory of 3748 1284 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4e941a9cdbe8c26934873cac616d36c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd171146f8,0x7ffd17114708,0x7ffd171147182⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10473701993217321373,3006582657758509707,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
613B
MD55d36d6f615bb923c2326692006d114d3
SHA154d5bd79591a863e53f15bd0a22621f9d598e1e8
SHA2569d393ba5ac2b5a626e3758b216d1c2726ad3183f12eccd8a4809401c0adb4f62
SHA512cc6fd7f4ece4bcfc9408dc6e9130e3d3dc0f319bb2ee4c7a8d67f92251a16c41755024cb87aad2702ad775beaa8953a74a7b2922c0bb8a04c8396747498b8521
-
Filesize
5KB
MD571c3bc30f0f15e098d4e8bd407721a82
SHA14e22725532c35f92fa0e8c9a6a15ec0ec132b642
SHA2563cad733770537ab837ede8710cc2032af424e6a9a07e3c27c9b89b0fa2db5908
SHA51231fb80435aa80cbda86b9c7679bd62d0e47f7d10c476d3cbd694a2ee2bebfe80720206c8b1364be3295b52f0ec0809c9f6debec137e9f06019b14f92999cd6d2
-
Filesize
6KB
MD51c8c08725bbcbfc46909eb9588cefac1
SHA170c6ca4cf6f1c35625c8fcfc675c5297f0f83007
SHA256b2c53a5792878a8dce5fedfb857460fa5ccb55bbd3faafdd5b446313e2350298
SHA512dbf5ef10fb8d15046aac050413fd3685a51fcde6e4e218e4d95e2018877b53440f4adc0a2f6f0351287c744c8c89b9ed0b1cc63b9abd58a41ab3b6d384ea13a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52061ecc7a3056113b16baff7a0a031d6
SHA1a625edf63fe2f52155df9f3f7d7f98844dc74a16
SHA2569c69a3d36fa9835c7a140a983cba369b3568f5a4b7a79e7ca999e98006524af0
SHA51297e376ba4b7f3d1d957d8791ed52302505af40d12dfadcd1825a7df5d7461c1949c0d97c453e2d5f604f1550b29e83c7081acf5230e4fc996c8a143e22ede477