Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
e05e88815ab9c9d236d0ed8cb13b7ffb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05e88815ab9c9d236d0ed8cb13b7ffb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05e88815ab9c9d236d0ed8cb13b7ffb_JaffaCakes118.html
-
Size
22KB
-
MD5
e05e88815ab9c9d236d0ed8cb13b7ffb
-
SHA1
71887e8763e7604eb6c1cecabfc7fe078d60c1b6
-
SHA256
20fd8c5d6293b881a14a0b314d5636f852e06f20f6ab5841ad2716acc0e182f9
-
SHA512
507131830a8eed6f3ebcf54162379ccca30afc2848c35ff617fd793e006023af72dbda054c3f6ee00a305d9b073490d19fe598671e1aff525c6e90dac32b21c6
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJFZOGXpsEB+:GDiN59CfDgdvJdt/ZOmpTvuZYaIR4/n3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 2232 msedge.exe 2232 msedge.exe 3776 identity_helper.exe 3776 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 628 2232 msedge.exe 82 PID 2232 wrote to memory of 628 2232 msedge.exe 82 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 5112 2232 msedge.exe 83 PID 2232 wrote to memory of 4288 2232 msedge.exe 84 PID 2232 wrote to memory of 4288 2232 msedge.exe 84 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85 PID 2232 wrote to memory of 3096 2232 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e05e88815ab9c9d236d0ed8cb13b7ffb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2ffd46f8,0x7ffd2ffd4708,0x7ffd2ffd47182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11188862436851155137,17873931277712406127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD55fc3ccbe1da85de30e72c52f0aa43c9d
SHA1da50105b2b56f3a70cdcc504f7dca751454ea32e
SHA256564cde641bef8840905ce526f940fedf704e1ce139d7ea8a1443a8d1f6ac543d
SHA512cd1579d44ef5ae68b4c5ad2dc3ca89d28c205539737b47123a3c2deece17b86b3a86e15497ebd49ace734fbee749addeb65c3f21baa19aaf67299157d19efbbf
-
Filesize
5KB
MD5db9b7e9d60daba0176a627566444c960
SHA1373784d5065c100906f56f5e79e6dba0e2e0b270
SHA256fdd98e779893c3bf29af0d44629a93816e242d153ebfae17bb62e7b1e82feed2
SHA512d156023f1b236c17f9ef11b83f78b5d1e4848e3ba53f29fc23fdc16c705538aedbc1956a4f34eaa34e65b065574d0551f051079db0c7e7f1d4c344f2cf71b900
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b3dd206ce5fd63949be83029fa4d4ff5
SHA186d86c0f09b45802f8b370b8f631ae226c6e7413
SHA25648b283abf2f3f6852587ea28498089c1699768f5fcabbddf37e12f48b78c14e8
SHA5120c48f9769bb51bb9377313217e78d166bdd5f5f97f53b52f5bffc271c284ba3f3871129320666064e8005612d85c4dbd6c24a7340face5f9a62325def1c6a1dc