Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
-
Size
10KB
-
MD5
ebe5ac56b17d0dbeede020a38517376d
-
SHA1
f9944c26d0f9c095c9a42c23858e8f4c37088a28
-
SHA256
dc3c6fa800299497158003bd2b784970f98328e7f09845334b99168ce61ecf23
-
SHA512
0448994fcad7f951c85660b46122d4e324a76029513ab0acfec61f1dfe2b5767413b1c0eb912a2c89718f5865956d5a984fb1d84fb9ad11e98ce85ebfda43da1
-
SSDEEP
192:syx8ENgBQtRTRLcbyzmMFKYnpR002mP4vteDjHaHu4CAGYsJw6uCsByHZE0:szGTQ0s47AvGa9CAGYs0yHZd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 1880 msedge.exe 1880 msedge.exe 4524 identity_helper.exe 4524 identity_helper.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3068 1880 msedge.exe 82 PID 1880 wrote to memory of 3068 1880 msedge.exe 82 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4672 1880 msedge.exe 83 PID 1880 wrote to memory of 4064 1880 msedge.exe 84 PID 1880 wrote to memory of 4064 1880 msedge.exe 84 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85 PID 1880 wrote to memory of 4228 1880 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff381446f8,0x7fff38144708,0x7fff381447182⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4057089765139472580,3772339081876805758,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5163b1553ff354ee1d39848703f686395
SHA1563331911a510b13e595ba1bd85a2877e134b36b
SHA256777d50dd1b5df7ed111b4d33efef07b306653477e41edad33e1672e261e8a2dd
SHA512ec2f8959e02eecd8eefd0dfadf2aa63285fc14bfc447e67f8468e30a6311adf25c61e0868f01568d51a89922bb408a64ac86916ff4338d7d058039bbb15049b3
-
Filesize
5KB
MD567c3eae2a5cd9c1b978a4670cbc86200
SHA15f247d897fcf4d8fdfdb26e9cd05144edbb44ff0
SHA256cbb214ab8a6b7004c2e003c35d5462c59f55292fde37e1c888e1d4eedf7a8a6b
SHA5128cb0ce17e329f6fef058ff6dc3a5e6ae0d0bce472ec5d7951faa77148326d8fcaea89ed00f4f55c9db0a3750d6d3ea62706bf41a18a70cf7df1135275b161e25
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0a503a7e2e84b4b7726c846bd9e7972
SHA199542bff22a98e835afa2b5c5332a38036186bc0
SHA256320aff056fbe37ede62f0f12d0ee4defd740223b27b859f0f2550168f107b15c
SHA512ddf503b8e4ae01801854ace338acb22d0e449e1ee16f3d588bdd62fbf056d92210ae13205b71c720f84fbdc9efcebb8dd7dc6d115ae128d98c93d6111b22df21