Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
d673fee856992451061a883627581e47_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d673fee856992451061a883627581e47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d673fee856992451061a883627581e47_JaffaCakes118.html
-
Size
4KB
-
MD5
d673fee856992451061a883627581e47
-
SHA1
207f77b32b4c57980ac018a5489e3897902592cd
-
SHA256
472349115f335c38cae173431621bad1e39d0635cde61c2c6abfad3930150673
-
SHA512
b3a42630c0ed7e7259515c5974f10c0080b6a349ebece2bebfefc025fcb81e1c141b868520ee6f74e22aca1af2b90577728342884c45667e9b7c80ea3fe47a18
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oLhq8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 4924 msedge.exe 4924 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 544 4924 msedge.exe 83 PID 4924 wrote to memory of 544 4924 msedge.exe 83 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 1576 4924 msedge.exe 84 PID 4924 wrote to memory of 3748 4924 msedge.exe 85 PID 4924 wrote to memory of 3748 4924 msedge.exe 85 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86 PID 4924 wrote to memory of 1676 4924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d673fee856992451061a883627581e47_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe15eb46f8,0x7ffe15eb4708,0x7ffe15eb47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13273269494752934194,5357942789415542579,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
292B
MD56ae80267cce6bd2dfadb6b06af8ae61c
SHA13a235671a1b861ee6e23d3a047660e85242c912f
SHA2568767224dfeebfafac60550092c2c8229c1c459a44972b9600960781d7c9af1bc
SHA5120d5e8cbd03697a492ede841f3c805d000bfeccf9e87b91bc8990c782093b7bf095e3fc474d0616bcf78327d3c8571f3b7285c15970ba929306900dc7b1fb21f5
-
Filesize
5KB
MD58c3c4e9f171c48a0523e189cb553511b
SHA1450d3358b8ca0bd7487010a65961b4e0e4187e12
SHA2564cd2e869e47a90fc9545494778d77c4a48b9756ecb6b0a0bb55238b74460cc58
SHA51239461d2fb90523424dda028cacfbfe40c223b10e588ae6e39d6cf69528ac76727d45d8564e9f871311abd0fbf94ada07c4e6079ef2fd93a68faa30ddc2be82e3
-
Filesize
6KB
MD5eb4985122ea44f3466371f99ca5b5026
SHA18b0e26c1568436e48f8c7b8cd0e54fde705a96b1
SHA256df21daacb5cd9cc75b4576cb73f017bcc59695c442d1a06cc015af66f2aa1a9b
SHA51284b0bd78ab6e2377db7e4f6bce142cc1d4be642680df61a5660238afe59e839fb142ac23ebfe1cf1e737c8ebed20ac451b1bc2218c4fc1689daf0b12f9a7efa2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582d0218b4e4608fbdaa19a0325798b1a
SHA15f9b0e6ae013b55a3ef64dba5d11fc4813986b19
SHA256bc4fb92f3d7f247be400255017a6c81a933f0fa392e0788d3e4caa7c6296f19a
SHA512ab4c0ab9f16dbf150f372f74869a0ea51540c8b82789a684ef515f36200033097b22f45076aaf69b81955910401ff7af0617a5b687916eea02ea204b0f7659ca