Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
e0baee4be82d8361798bb400ae853fba_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e0baee4be82d8361798bb400ae853fba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0baee4be82d8361798bb400ae853fba_JaffaCakes118.html
-
Size
27KB
-
MD5
e0baee4be82d8361798bb400ae853fba
-
SHA1
16b56a44d477ba570653327a55e0d165083c3f8f
-
SHA256
0405918401cf3f838a92df5b59391e93db42e9e9fa96ec1d10962d38efcc6ff3
-
SHA512
462fdfff05d2b230bf9c42d58e926a19f98cf57e228c8cfae306c5f20c269cad1cb2363ccf992a84b3888d3510c0e3843d6480584c1c5f36a51a8e07e18eac83
-
SSDEEP
192:uWTmb5nmqnQjxn5Q/+nQieNNnKnQOkEntOwnQTbn9nQCME6RnQtGIMIAwAcwqWMe:PQ/Zf5xQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1592 msedge.exe 1592 msedge.exe 548 identity_helper.exe 548 identity_helper.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4464 1592 msedge.exe 84 PID 1592 wrote to memory of 4464 1592 msedge.exe 84 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 3636 1592 msedge.exe 85 PID 1592 wrote to memory of 1372 1592 msedge.exe 86 PID 1592 wrote to memory of 1372 1592 msedge.exe 86 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87 PID 1592 wrote to memory of 4112 1592 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e0baee4be82d8361798bb400ae853fba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9835546f8,0x7ff983554708,0x7ff9835547182⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9664237599836163565,14830674049348682102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5f3522754f6c52fee99f346eef9ff4877
SHA1b2b503543d1ddf009202cf5e828ef024da8ff17d
SHA25695b5bbf2489f4c6f4c69bc9cdc5f0f297d7385a3f4543891832c97766971ee53
SHA512b1877a9f2ac425fa514243af70dac5388c5b0e4bcb1e9db802ec0151a6222a9727eec2074b58b6aa065ec355b2d8e04007526baeb8145011cf965b9bee087084
-
Filesize
6KB
MD55af8fcb03104ac349aae8e2dcf8ee1dc
SHA14a051f57b2c7ae5e6c0180bd7cd5286b2778bb4f
SHA256e5f5958a79c33b517113b2d9c14fa887e6254484d6794560361ff81f76e6cb18
SHA51264f531a6f54e698fbf10feb87e86c0ec1acfc8fe9886b0546fa585a5291776fbe885e5d8999b7de0d7dcde44e3b0085384bca1eb3e04a92413645e4025126dc5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d264b6320f440710ffabecfd624ac277
SHA1712d8f4a8aedeceaf31c7ed1fcad3c40204ea56c
SHA256a4f18e9b47ed842ef8f2f7c5c305ae6f127af4dde167e5fb7be4b3573ee38951
SHA5128cc431a72fd2513976b51e21d64d19a73317b7920526d32757bbf36b7079182bdad79436c1c9cc21e1407198768d357505af30d2231418371da5df3418bdfefc