Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
eb3abfdd794ef2bbd8275b33382e8cca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb3abfdd794ef2bbd8275b33382e8cca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb3abfdd794ef2bbd8275b33382e8cca_JaffaCakes118.html
-
Size
13KB
-
MD5
eb3abfdd794ef2bbd8275b33382e8cca
-
SHA1
d86882425881aa64e4f00cc4930400d32a51b4d7
-
SHA256
5c0ccb7be9eacde9105ddc530f6c8950fba46e7c8cfe08ec075828e856fb5ea4
-
SHA512
f68cc2709c0bd4252e9edfc5ce91aa3f097d1a3d69d0bbe37245add12de0e0fe4606fd19cdcccabfd0c3239e15b0d9a7553488313ebb889951a4f1cd27bedab2
-
SSDEEP
384:O9cH0czMomn/Ef9yBCJp9PwK8EPMt32BaEG:OyrzDm/Ef9yBapJwA632kEG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 3100 msedge.exe 3100 msedge.exe 3076 identity_helper.exe 3076 identity_helper.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 2560 3100 msedge.exe 82 PID 3100 wrote to memory of 2560 3100 msedge.exe 82 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 864 3100 msedge.exe 83 PID 3100 wrote to memory of 1088 3100 msedge.exe 84 PID 3100 wrote to memory of 1088 3100 msedge.exe 84 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85 PID 3100 wrote to memory of 1424 3100 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb3abfdd794ef2bbd8275b33382e8cca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a19c46f8,0x7ff8a19c4708,0x7ff8a19c47182⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2852195854847000262,4228499576919831214,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5502793dea7404ce20e21bdb6bfe0d514
SHA18eef5373c93a4d1860de37f22c48995c5c614f8d
SHA2562da027c10617d3fb321d37414a6c330bd0026ab8b198fdb33a4cfe79dff533a4
SHA5129c011e56e368f3134e864c167d8d8917c1c4abd7ad98797fd11867116008b592f633ebd7ee061b24a0e26f6069966d1c75a409be39cac9bf4e85833efbe75e36
-
Filesize
6KB
MD51df9a55d69335591cdba4c6df04d44df
SHA11e19ef8e4a5b66db9757387653abb6f183c24e48
SHA256600155d37dfeca59322a04c04ef46d3ca77893637aea48f6dc9bd2865da5ce8c
SHA5122e0cd24807dc3f2b8f7b7d51bafc73c8b24eabf90ad1aca2e17358810ba78357cd512f90bb5aea88333d8635e432d87da9225beaaa376d5381db999977e7129e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD540ad5742b47ece9b3ec5939ae4fce268
SHA1353e63f038c62e9cd98e456f20d86774d410f28a
SHA2561b53ceae012de50d6ff462da5947701c73091dd9d93d9b848e636bbf941c20d5
SHA512c07faa089b000f172a5b7eed393a80c782be51169acff27989dba518c73a8f0a9fb0367d163f91c8134af614e97bc9f8710e6acbad65e4e37a2856617cb54d8a