Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
-
Size
3KB
-
MD5
e00c4a080b787ec4adfa77b93643f0e4
-
SHA1
2a31a1f2d0e13d5dd00b515dfb17b2e8292d427b
-
SHA256
a45624193f03542bf16587dfae125b7e9ebb6f685a93e104cc850d40e16d2c4c
-
SHA512
b48ac05179fad8f94e0f1d1e45ea3c8df7259a00cc4a479eaf5b49cc32db2ee097e9feac78c890cfef58f20d8b287200e9cb79725ea23a8b3e9adf7d82114962
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 4520 msedge.exe 4520 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 1288 4520 msedge.exe 83 PID 4520 wrote to memory of 1288 4520 msedge.exe 83 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 4496 4520 msedge.exe 84 PID 4520 wrote to memory of 3808 4520 msedge.exe 85 PID 4520 wrote to memory of 3808 4520 msedge.exe 85 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86 PID 4520 wrote to memory of 3456 4520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,6364887198828106774,11291567156695314608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
6KB
MD5c5f25661406fad4efabed0cbd1406be2
SHA1d470a29e8b3482c0e24b5db08ad426c879792251
SHA256d4b4ac834b95e36c862f8506e34699422b21af75c3e29562cd84a0d181dfdecd
SHA51245fe4f7b50261b5b783b3fab57b2910a3cef894a95a2d6f7399a5f43f10b2190ff8edd549a0a437fd60af1bead623e7c848cd274b723ccfefff01026f485d939
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a21d7fe7-8e87-4a5d-ab2d-04ace54c3022.tmp
Filesize5KB
MD51eedb5ec2276d750fcaca1fa0398fa09
SHA1eafa13218b9bad64646fcb26aebec761431b4fb4
SHA25619e04a0759e868149f27ff650148bdf30194bc899769b0e8a5c95dd9b28daf18
SHA5128f8d9ebb334b06ab141ce20128911b984e1c3018753dbacf63b9b13ae833b59496f20ffaedc407ccbedcbb7f95ce8636ea43869da840b7390a722221b4bfd2ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5eee2477d3ae3c46aa54ff61082e4a1e0
SHA139ba702515637fd4fb805bf127c35e342dbea237
SHA25603609a14e7d1148818724700fc578f55ec89c3745a4b100d816653b1a2e2e47f
SHA512fd38739ed94f7740efbe9a3cfafcb1ac87387c43bc2ec0b11b6685a4acfc11c6dde2e9ac0e9b6228a941f9227a2d707cc4a3be06b1fa496bd8a403f56d9c2110