Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
-
Size
128KB
-
MD5
e05899bcd07a84271cc40ae00baa116a
-
SHA1
5e00039b746e9acf58cb489b5cb611141611a525
-
SHA256
e479c1babcf3cd2cba7590fb1e6c90d918a6940f84959eeec224d336433e78a6
-
SHA512
de18c45a10ebfb14163ea55716e8befd0bbb3e6ef7f1c44adabe03b815ce6df3b2711fa96aba7223873710438fd29625d38558bb11ee40489e530bc806a49962
-
SSDEEP
3072:S+HteLq4BfxIsAzYZVyu+6QscyfkMY+BES09JXAnyrZalI+YQ:S+HwLq4BfxIsAzYZVyu+6QsBsMYod+Xu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4032 msedge.exe 4032 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 1660 4032 msedge.exe 83 PID 4032 wrote to memory of 1660 4032 msedge.exe 83 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 2796 4032 msedge.exe 84 PID 4032 wrote to memory of 4828 4032 msedge.exe 85 PID 4032 wrote to memory of 4828 4032 msedge.exe 85 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86 PID 4032 wrote to memory of 2672 4032 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ff9addf46f8,0x7ff9addf4708,0x7ff9addf47182⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16847001918955908826,15280475954651171277,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
189B
MD5b6bb5bbae6d7649a3a5f67448bd2e3c3
SHA121d2348904a12113e6aff93d5047f6b3e40de808
SHA256ca3d82c7952e8caa61a48e64e82080f570b3c52c94ef74b28759c3813014865b
SHA5121bce2cbeced91da134b655f73a6f33306c3b3040e7ce8057c12c6b06462c1dca95090add9cbef824de1789696c78367b10dfd53edcf00de0c01d2c3e70bbcfe0
-
Filesize
189B
MD583d17af038a3f9e34770b3be8f76ca9d
SHA12d84b992760754e00058005e599fe76e139a82fa
SHA2563012953cbc052fca4ba2d2de240dcf95a2fb49e7d759607b4eb7ea8f3c8faac9
SHA5121729c8e3ba600d0d3d10af37e1692d555d9bdbca824e55472f93c0fc2a9d327531abb7a3ca51c0fd4c6c6d71fa3ee1846634e0a3d40ebb92ca1817e0ddbd1d85
-
Filesize
5KB
MD56468c0e32dfac92961214b30f9726afb
SHA1f5e02efc40ab8efb62f1b50dd5c9d73e8c588395
SHA256e53fdc458edf9b72d19632647b15c74e00ed036acb65ef2ecb37690dd93ad967
SHA51253a3e55f92bd7a350ca9e0efbc9f29fc73aaecbb6e4ddb79f6a102265afead9dab291cd8174033afd8886302c0cf8acd83534dbda28eb7033f5a09d80770ee27
-
Filesize
6KB
MD511a79b174cd607150838aaadbcb567a7
SHA1c57ea879b32965d154296e88d453c715316bd18c
SHA256ddbbba2e314c63409c52c2652529929d2c7ec08dfe1f966421c3cee96f7b1aef
SHA512fdf4316dcee1e1c47e8397d5e06132a8ad3829710ace52a74f8bb502b5ca0deec983116a0329487b354664069675e5600b6d350db5f82f8594c1cc520c184eab
-
Filesize
6KB
MD5a3f53c286f81dba756b3243387ba15d3
SHA1e74d63d76724462a972fb3a681b69c55e38c790b
SHA25657d4d32dfbf5c8261075704fe6824a5ceabd07327e939a4d567ff1f8b32b6116
SHA512e4b1b87bf48277378b6291f6bcc208393fb5b549ede403c4ad622dff0091c4289f0dc4ffa127435033bac2169ef6757f544b21c45962815d8cb565acef6b88b2
-
Filesize
10KB
MD50ed5d0269a99ab2211039e0abb8dfae4
SHA1d3926212518b38dfd815da2f3aa816fd2364874d
SHA256decd9a62dbaac03a6aaf494473ca0c7a6a3a8cc33ca118bca31d3ee78e955914
SHA512d32ed297114b86c03451405984396b5761c4e0c43a1cb3dcc6b28e2f35aa5dd61f8cbc9d9ac9d2ce5cc63e44b6f385335b530aa70ac24f99da0f2f59729ff9ed