Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
-
Size
36KB
-
MD5
d743cd770e29606d497bd1d36a2f6dc8
-
SHA1
637314b9340e14722627a2f3a0474559ec2b2a07
-
SHA256
a349658ec8825eef1b22ec45ba2d76909a3001bc0089e57565c483ddc55dd1ba
-
SHA512
cb40ce0b7c9e30bfc4e7a63dad9f3dd3ac3dccf2d15828e72661ad349c6b37f8c35a15e52f8c7d6eba01a4bf13448e2c51bf3ffa0624526c72c28e0433554970
-
SSDEEP
384:F1AaB/tiEM/Jo8K8ztXtLPH1J2QSZjOHxTEf6I8IxGXtXaMxKuLRFD1ou6Vs/axC:FTtiEqJ1ptIx+98QbKD/my/XwGhuWyd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 4620 msedge.exe 4620 msedge.exe 452 identity_helper.exe 452 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4052 4620 msedge.exe 85 PID 4620 wrote to memory of 4052 4620 msedge.exe 85 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 1876 4620 msedge.exe 86 PID 4620 wrote to memory of 2636 4620 msedge.exe 87 PID 4620 wrote to memory of 2636 4620 msedge.exe 87 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88 PID 4620 wrote to memory of 964 4620 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffead0b46f8,0x7ffead0b4708,0x7ffead0b47182⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8410951273777855746,8212498213374985316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD58c6b6c18a064a82140389953c75cad8f
SHA1ef644616229eb6ae633879320a6f964ef0b83b8c
SHA256a03feaa14f4a706f522544cfd9ef64888bf39e33afc01cc60f34136a5832d659
SHA512d4f5a6e3fd958e6644788b3bc45a9c3e70ccf3c9d3b38e4f44badd1ce9701f3c55a3df43c717ef67bc7b7ee8ca56820b2bcc4c5ba1c4b8cc9a61b2c1c92f3d24
-
Filesize
6KB
MD5f0222107989c63e6ae2ed8b623ec0eb8
SHA1135f0f88425ddcc8d19ed5328a0cc43b4f71cbaa
SHA25614e1d5352f6c1597fcd4d6db64942702b757dc02e68e6631e94c2ffaf1e4b837
SHA512a22d44b279a6b658e3b0a2897e4f7971a38711f1f2d402122c7a0766e23686def788f58ffcb99106de2a706fe418c2caee2f06eb6a46bafb5435993f88056e0a
-
Filesize
6KB
MD51d70aaa2032b311561ee822d3b73f3a5
SHA1d01236cf5eebafec437e4c2adaf46ccdcc98d717
SHA2569c76a2c97c2a318806835703ed328a8dba9304db4c71b6ebf9155803b1fbdf4e
SHA512c83df3c947fdfa45aee2b6778471d89c8d4191516f224c489dc3f5ffa43d1c0a27f5e3635cfb8000940a7498c2ae3c14c2619289a91fcebfd16aca4068176e6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5586d115a3748a5f9fe4e027fce2190e0
SHA14fbbc471592f2cf6391198c5576b6df28b815b37
SHA256954000ee01d91cf22b98935daa1b4932d28f16178c7055975ff0a2177cff6caf
SHA51258497e043a4eb3e525b302bfb6398aeaedcd623c01951b3bae7e58ae8c1d64f4eaa4b5cf05654f84926a3aa7bf8c1de7dc664213fd22de3cf2c3c409fd142b0a