Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
de8136bb749f47011133829206315aea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de8136bb749f47011133829206315aea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de8136bb749f47011133829206315aea_JaffaCakes118.html
-
Size
62KB
-
MD5
de8136bb749f47011133829206315aea
-
SHA1
54a645ab70652277a3cde92b06a24987c5611f0e
-
SHA256
52c6ab8c609ba75e893a4b584c4a0d284461886604888bd5f2ea28b650729675
-
SHA512
201fe68c9e1c6426c83808b3c2a7b4b35da11e863d8ef9ecfef73e83dd8bf6d8b503cfca37534db0ccff0f187ea35ce9b05855bd9bedda7bb9560105c99c0efe
-
SSDEEP
1536:92qcC9sTf4MAyLf0EHUMWPacmPBPnqud8+e1EWYYhdYOGXWT8Kh7bj3Gx5mqU:9WC98f4MzfzGPKyqKh7bj3Gx5mqU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 4084 msedge.exe 4084 msedge.exe 1796 identity_helper.exe 1796 identity_helper.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3344 4084 msedge.exe 86 PID 4084 wrote to memory of 3344 4084 msedge.exe 86 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 3604 4084 msedge.exe 87 PID 4084 wrote to memory of 2500 4084 msedge.exe 88 PID 4084 wrote to memory of 2500 4084 msedge.exe 88 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89 PID 4084 wrote to memory of 4616 4084 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de8136bb749f47011133829206315aea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc538f46f8,0x7ffc538f4708,0x7ffc538f47182⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1508 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10969869927093294195,6637712346255895711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
309B
MD5a7a9c5b7c579293dfd4ad0e55aa9ef92
SHA1d2c1656f628f84f24c7debc20209d1a22b02ce3b
SHA256a23395f00788b192d96ac771c0197850ab570e02afa8c477cf18e29680fa16d8
SHA51266c64fa7259c34a5aa400fabb1cd26bcf3b0bb970bf09d060287d618134aca0398e535622a69d93362e967a5df0f45e6313740ebffe14c5192d89b1494fbc6fe
-
Filesize
6KB
MD5aea085df649e679c88b2829a8f905fc3
SHA17c3b466ecde65dc232dd6ea0618a773e82532491
SHA256e8995248412b61d81eb33d6b70c95f5a7320df943cb244228eef6089da93acbe
SHA512af9ace7c46ddf598c29c424add9dea53877b0327d6674557c23fe87f73bfb0570ad00ab1e156676793fd225664e6d2f671e9124bffd97cc6252c185f009cf575
-
Filesize
6KB
MD5d0fd7c22bd5cf3f8eed762d18012f19a
SHA130fc4f077daff94cc853853ec8c4cba3bf83a1e9
SHA2560fe2ed2b69b12a286d3676346e478994b9ab26f8eb1b9d6877fbb16953af11c7
SHA512355fa79b073e8616f284e50766700994eb80b9efab3db4ba4b2fc106e04c63d0541029f7bc546ffa25c5feacfa667820d80a1bc8cb7c195864d40d97ce29ce15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a6d86f32527ada4598df81946037d79
SHA1613c6a5e722c59e5d8de7a84f8140ab96a963993
SHA256502b8a95d2a8ff65e3f6a69c51d74a7967fd6a9f227f74e9f4d9eb78485ab848
SHA51254cc350d6ebd12a68aced92d6ebc6f63e19def5129bf02f104a11d872dbd37a1d27ad11613b5db90870b6806b4233915d61b3309dc512c04af69057f96d13b8d