Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
-
Size
3KB
-
MD5
e20a4c0b11a4d1c85cd8acfa672e9510
-
SHA1
02916564e45df61570426c87c94d7e6da28e9247
-
SHA256
eb3602ec1d6aa4df8f4364fbc470a8fa62111b84862ded8c92ed83ff256424d5
-
SHA512
d199eef635c67293370c11f132f8776e34ee36e465d2b0333962a395e24cfaba88d7cdcce28ae6fd15af88127925c7554fc06ad6555fa4dff93eeafea8dee8d5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 1256 msedge.exe 1256 msedge.exe 1652 identity_helper.exe 1652 identity_helper.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2040 1256 msedge.exe 83 PID 1256 wrote to memory of 2040 1256 msedge.exe 83 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 1056 1256 msedge.exe 84 PID 1256 wrote to memory of 5044 1256 msedge.exe 85 PID 1256 wrote to memory of 5044 1256 msedge.exe 85 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86 PID 1256 wrote to memory of 1016 1256 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd83a46f8,0x7ffcd83a4708,0x7ffcd83a47182⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16270252030904208238,14383044206039509618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD557cf914d4cc806ca2f8f7267f4e87a99
SHA12f098b032cf0797dfb471bd870b1405670284053
SHA256d6d4643ef14c36c80521b4605275379c88324f85b662ce873f3b38f54bdb9cad
SHA5126e871bed79281d41a6766a617a316fadc796606c920f846ae96a5583cb8adb92b5bb348db525ccc90719e7622ce36d08f34fc51377cbddc2b33225cf8aa1abf4
-
Filesize
6KB
MD5ec4e00e96d1570b6cbeca25b28584c70
SHA1fea2a57ac4fb4bd99d498dc397752b530bb5ef2d
SHA2567127389ec6c9052369bcfe13c28820d9f565fe126625ae8658e539d1250f9a0f
SHA51242fc17793512fb54e7a5b6072c9d6db6b78c81ea6e35d2a3ab9570d24038f8519fb1d0bb9e02dcd1d85945edcde7c76ecdc5cd737eecfc9fca50dcb003e70070
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD519bf0b6461e82f2a52611b37944e4c66
SHA13d6a70c9cd02416048cc3c26f8afe136827c3ada
SHA25697fc6a563da16109b6e20fdf3af70d5a61c6fad379387f4782fbcb200acc674e
SHA512eeb25a06ddb3da6684d188b9950ef49d255f82e777b47ec8e8667ca88bfd1ef6ab5d55254eb1c6eae53a2c9fde681c7e8f2188680da6a671b3af0e62b5ddfba6