Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
d5a3f75f3c88b28ca5f995a6e96e01a4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5a3f75f3c88b28ca5f995a6e96e01a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5a3f75f3c88b28ca5f995a6e96e01a4_JaffaCakes118.html
-
Size
35KB
-
MD5
d5a3f75f3c88b28ca5f995a6e96e01a4
-
SHA1
afe7990f22943fdc4252f7105541bea826e035e4
-
SHA256
bb9a150dfd63e80e9a0353dd3860ad75a450c17267f06c9247ca7cdedacc4e8f
-
SHA512
80f848d4762160f46ca8e30ca44e7d92423a0d712aef7053e2bfbbf7fb2e38c518f75010110fe1ba64685334368fb661a74b45628efcf7bfcf6e581fefbbc565
-
SSDEEP
192:uwfIb5nOn2nQjxn5Q/unQielNnOnQOkEntWknQTbnBnQmSyxD4ZUvRXE3btcBP3a:d3Q/d7x3lybs880gj9vu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 2600 msedge.exe 2600 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2648 2600 msedge.exe 83 PID 2600 wrote to memory of 2648 2600 msedge.exe 83 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 3952 2600 msedge.exe 84 PID 2600 wrote to memory of 1424 2600 msedge.exe 85 PID 2600 wrote to memory of 1424 2600 msedge.exe 85 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86 PID 2600 wrote to memory of 4968 2600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5a3f75f3c88b28ca5f995a6e96e01a4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff227e46f8,0x7fff227e4708,0x7fff227e47182⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4250286097495059823,4366905366565650039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD591c761fac03015fa1f2724ec2aee85c2
SHA158af040f2cd41b48f6136e4722ec4005276a0708
SHA25680c3ad08d921dec61e3ec16e5f53112b9be314701595c32f9c553887faea7b9b
SHA51202a7792da052e14ba8606e1dc97062017733c7c22c02336df72fa1eca6270d2daf2fbb6c2c4364d79b792deb9ffb3ce81af19a46a94a13defc9061c1a03c7cea
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5eae66e6a4d4406075c087a64ff5b285f
SHA15a1686deccd7728a27dc5a00355b852139e2a6ca
SHA25641637bf140c9a69084643a6975c7832d593f4af8bed61e4d53bd4101b32adacd
SHA51217a6d3b9daca3602a33de5b1f8958f11ef63bbda59ef811d4b88c7543d20f80bb264a6266e5084b9ccd8619565aa117e34dc3e4925b2c24262a6a06472393174
-
Filesize
6KB
MD568dde41bc6e1f15a005b9cd8dc6eb485
SHA15b0cfb654b8d9aa1da3c9f67e90cf2d85bbb6a7e
SHA2561031c51c1e91caa094cda2973484d7e8bdf422225bc172678ed043579d3ea9f9
SHA5129f78698b6a490d8a362d1d5fe38aba432bbeb22d6ea6035414953df298a03f7f9b09e6bfc2e0fee4aa78cf95c8fedef34076ff43571597d9d43034279e0f254f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389