Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
ea892cba577415c7fed514a0a66b607f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea892cba577415c7fed514a0a66b607f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea892cba577415c7fed514a0a66b607f_JaffaCakes118.html
-
Size
32KB
-
MD5
ea892cba577415c7fed514a0a66b607f
-
SHA1
f184e6c8f744be7c3ee17d5d855f74eebfa34e69
-
SHA256
200b460d865fbda3a4ceb7666c1ea3c883249dff9123ac1a2c898ad3a59b47bd
-
SHA512
84925c81a012ba3a68664a874cba13f500d636aec24ee205059b544ba8f38942e2c954ce88432237020272b698de22ecf2eca931317d80a8797221a6e9a19ac6
-
SSDEEP
384:479iy2sfzeOBMtJSrJvYOxBIeATpG/IJc+xw/TleEFSO2yATy5elh7lXcC3257yx:Fy24eOCih5+xw/BeEKLy50lfyb0J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 1396 msedge.exe 1396 msedge.exe 1056 identity_helper.exe 1056 identity_helper.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1596 1396 msedge.exe 82 PID 1396 wrote to memory of 1596 1396 msedge.exe 82 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 4924 1396 msedge.exe 83 PID 1396 wrote to memory of 380 1396 msedge.exe 84 PID 1396 wrote to memory of 380 1396 msedge.exe 84 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85 PID 1396 wrote to memory of 992 1396 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea892cba577415c7fed514a0a66b607f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe746446f8,0x7ffe74644708,0x7ffe746447182⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2647567456458579941,14645028350927943440,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
649B
MD5b407da7384fc0914ef183c18529c0862
SHA1cc039dcd952df29438714226e6e10743bbe27e80
SHA256706ca0c982e3f3b509b10d07ae6115c3954588f3c0a55b0e84cc20476c3112ed
SHA512cf32105814a81099a5b90fac48c1379fdc798c72a3ff13822b739475e06a6e9f8f6e040a3c99c13401f6420208de939c5de427746732c7bd70026de776ec3220
-
Filesize
6KB
MD582b04dd18c422c1cfce2fa910961b570
SHA1879cd451af479d9276f716ac1212aff996743a93
SHA2565b3c37fe76bd0d090dd7c4adb621c1ed7e26cb955613c66a17476653eb378c84
SHA51207702efb991ce67e6fe0cd30aa06debdcc6ef3792b010bd46c4c01804fc89e1baeeb0bbd8f4eafbe61f140634139d74643a1db5674e733f3e29877c068bddfd7
-
Filesize
5KB
MD59067baff9d92f28bb8afbab9cf5e9caf
SHA1a3efb8a39f22ceec5384ca2f2672fac496ec737b
SHA256a6bbc33ddb8f51db37f5c3a399adb0e7624b9955109629ac3358e7d828875e9b
SHA51235b6d771a7c0d25d244ced82e90259d66eec58d2b61b3db7c40c92afe6dc3c1b488c53b44f2ba32f43684858fc71035f146412293153e470c3dbdd47c0c05134
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD559dea1ed4099490bbfe47b065162a5e5
SHA1ee0249727a82975c2a711ee3a33d5900edc644b9
SHA256d9625a7b6bb4e041b186dbc250b0b20cecd5087ae8f3f333975827e8eae21030
SHA51210940c5fd4acb1e9d64d83f082f9bd8bf52e8c3fff71a95aa1041dfaee5d66b7d02ddd36af79617f1b449d88b001c1cf3a674e580ddda1e8ccd9d473297d6fd3