Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
-
Size
68KB
-
MD5
ea6725b6242551b42f263256f6a529e7
-
SHA1
5a0b74f0990d681fe729f39e80ef3ae85ae7c7d4
-
SHA256
8b1e692e2f75b6b352807e9057db3b2a9962010d30449994f44d99d313109c31
-
SHA512
6269a803a64dfcd892364777e88f26ee6168df683663b833bc8d71404e814be55765fbfe2b4e7fe40fe832cbab1b8b363908c3bf86f4a7a11850df3177d59205
-
SSDEEP
768:JiygcMsSZ8tN99OIs+qdS/pw7VsQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//Ijk3:J6W3w7VsPec0tbrga6crNnz8PJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 1320 msedge.exe 1320 msedge.exe 2220 identity_helper.exe 2220 identity_helper.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 412 1320 msedge.exe 82 PID 1320 wrote to memory of 412 1320 msedge.exe 82 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2736 1320 msedge.exe 83 PID 1320 wrote to memory of 2920 1320 msedge.exe 84 PID 1320 wrote to memory of 2920 1320 msedge.exe 84 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85 PID 1320 wrote to memory of 2724 1320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a90f46f8,0x7ff9a90f4708,0x7ff9a90f47182⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14824215095249199205,1968482398241366181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD5f603eefb71896e5f4e7deeac7531a9fd
SHA12fe691faf754b920c0373db1255a2efc8c17f7ce
SHA256915fa8cad8d0a95cabe80514b376ae7e3e14b13bdf988318237920b66a53591b
SHA512f1f21ce8898311113be5a98ba02afd93941571b2948a5d412eed9e02d3b325918892a9de57a30ff535597201db89abf47d3c4771a0c8390a385094aeb0d353bd
-
Filesize
6KB
MD5f9812d29acd127926cc398e18236e3bf
SHA1e9cd4465e48211da639ef9f0c9b105c1f1954905
SHA256e79a13d0dfc31f6f219cbabc2663dc8045d94edc50171cdca02cdcf6af41b674
SHA512ed98525ac3789ccde662dc67703addb2f94bde98b83a843b77168abfb32d7b03511bbd8dff6fcd7e30643424c73f850a25006d6d668643bc445d31c8d1754eca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54e21e6a077c7ff092cc0f9d85ee4eddd
SHA1924bf779a535e6ae94761c73f063668d6b61e3dd
SHA256b1143f5039d79c6955b09d5c0e54387f892564549a7836c7a0bfca53c0383ac7
SHA512d03f85244bae974c0012934445aea6259550f48ebcc9fddb57f4b9c8292597cdb4680e1ad135b75db98ce8a97fad8324a6815fbf0c640e668bfe25893a0459b4