Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac5bb8b6a95e3c946e1dab7df403e41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac5bb8b6a95e3c946e1dab7df403e41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac5bb8b6a95e3c946e1dab7df403e41_JaffaCakes118.html
-
Size
88KB
-
MD5
eac5bb8b6a95e3c946e1dab7df403e41
-
SHA1
db420ed54a1a855572b68f8fb404dd3ce1bbbb44
-
SHA256
e392d81b1fc459515c629ce1624f0f7812f7b17556e6b659ba76c462eabc0de2
-
SHA512
67771332d466ff2206eb9182712445bd57547154681bc3b9c6626ba3b31d7c0c1520e03282c9c408096c251514f7335b5d125ff2ef6a9d6aa7d2d218ed4e68a0
-
SSDEEP
1536:hfesfIsGtBVvrms9RFfkUUx+hD9C+tnwHECO+i/c:zwsgv9XfkUUx+h5C+tnwkjc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5148 msedge.exe 5148 msedge.exe 5796 msedge.exe 5796 msedge.exe 2336 identity_helper.exe 2336 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5796 wrote to memory of 5616 5796 msedge.exe 82 PID 5796 wrote to memory of 5616 5796 msedge.exe 82 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 4320 5796 msedge.exe 83 PID 5796 wrote to memory of 5148 5796 msedge.exe 84 PID 5796 wrote to memory of 5148 5796 msedge.exe 84 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85 PID 5796 wrote to memory of 4932 5796 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac5bb8b6a95e3c946e1dab7df403e41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa10646f8,0x7ffaa1064708,0x7ffaa10647182⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16966025685934471227,18055917220723166624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5c8b20977e21325e84eaa3219b961aa5a
SHA1806ee95ff34f69d9ec29ffbe625076aa7fc7c396
SHA2569ea7980e2415905dc357abb1563e0c1b201c273d9a9bf1dbf513b44cc445276c
SHA512cba8c74788bcbf022aa400094dd324a7ca0f17818671fb7840a9c65fbf6c69f29dc51ed0c99982f2cc93fcceda9a43295e004b1990b811beba2afb7545bc5c3b
-
Filesize
6KB
MD5c5f882bb8cce21693dbe528969171716
SHA10a19d102dd5d64fca5d0debf1c1fa43ef07a56b6
SHA256ca912d560ea4e09edec763d8f8884ed0b74dd98cc9386069d176e8a052d6fa30
SHA5120f0ab553ecbde3f46c4bdd1c8c7300276b141b3f6a359ff4fb8af065bafa35e67c5f33af4a5e15de2483e291b252fdbffe778fef567715d03d08fe52a72872f7
-
Filesize
6KB
MD5eace141f73008dd0476041fe69e699e3
SHA15de665e2dbab339218a99ec9c9837db8b463e694
SHA2566f1818322d29925a19b4692300338cef30e310621d670cd938c3865fc7f60e66
SHA512bfc41afcaa714ada4c6c75bb7a246d87948ea2bc58afa3d65f21bb6f2278b89bef6aaa3f1b045da8585095a4bb1db9e3b29554c3e9ca80bffe7f911b94ee186f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5419b74b534676e0322e5b9e5063b06be
SHA1e018de7aad41689fa7037f301ce694ca77f8bd52
SHA2569ed605d464515234ac343ec56a4fe014cdfed8d2229bd6aaa0c8afe6890ca5e9
SHA5124e253207f3604a073b6c9c3cfba033a33d1c021a5ada42a953c2f655c1de05704ef3e803a8081955b35c885517eb528219533ae686816c03b11e1cf8b3dcd779