Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
e20861f9fcbff174a32a293326364668_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20861f9fcbff174a32a293326364668_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e20861f9fcbff174a32a293326364668_JaffaCakes118.html
-
Size
460KB
-
MD5
e20861f9fcbff174a32a293326364668
-
SHA1
a85c2e38513434f79b6c7fc0bbf9f2ce2e967235
-
SHA256
8c1619148b78a730f0b1a2caaa7a0a630a579fb10a060c0adb7a25e6788d745c
-
SHA512
9c72cce1abe35e6f9681479d7b1664d9f2fb0b1e14c5934addde58a09c3d834af25b130c1a73200bf02d1f4038f85d360f9758c4e0d63914585710209d487890
-
SSDEEP
6144:SDsMYod+X3oI+YdDsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3L5d+X3D5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 2232 msedge.exe 2232 msedge.exe 2808 identity_helper.exe 2808 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2916 2232 msedge.exe 83 PID 2232 wrote to memory of 2916 2232 msedge.exe 83 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 320 2232 msedge.exe 84 PID 2232 wrote to memory of 4996 2232 msedge.exe 85 PID 2232 wrote to memory of 4996 2232 msedge.exe 85 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86 PID 2232 wrote to memory of 1308 2232 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e20861f9fcbff174a32a293326364668_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa47c746f8,0x7ffa47c74708,0x7ffa47c747182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6468828694238344361,8303420510919684959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD59b301ca7ccf46ce36beeb55af629e481
SHA1288b9a6aa9848e365d446fbfa972c986917d5c1f
SHA256689efd326cb1b8f781064fbb575f150144549f404606afad7a7f72bce1c19126
SHA512b47e506692280b7445f3bed5ea95a8899edc9ea868aa26e647618118039bd96eec5771adea304e947920c459d7833aff78a68f301c9809e2e05963663b97c656
-
Filesize
6KB
MD5a234108b7f08eaa7e596849718063d56
SHA1772c41b27ba9b68cf7ffa0590637d2d0058a13ab
SHA256381985ea2bb91b9ea61ecbf79351528f68bfd4256796f724904e218d66c8bc4c
SHA512ebf73dc8e4a685486ea34e7d4f8ce65f7aefe714970f31e0937be39476c35d15cd323cefe3ddcf8302d2123decf62b0b110ed8013e9ed1de9aaa230adea6854b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD557d586a08b17eccc8028adef487fde9d
SHA11b1bfce62d6b8ed3a9ce7eac97f9b891cc9d364c
SHA256874efa6bf9c89c392989bbea976957067cdb8f6b382115e7041c54bd0b518cca
SHA512e3e4a31aa36eb8024e9e935ae70fdf72650eed73d5d05a9afb32a1bb69f8d4e901782d2708fd5a6fcb1af6a57b4a756d09b2edbd96698575c626737ae696213d