Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
-
Size
5KB
-
MD5
efa56b67953404334423e6f85e9782c6
-
SHA1
1507f0e076948383df106943858ff666a2d934ff
-
SHA256
29151a7fd6bcaba08d235cfa9e734574c8eb2b5da50ea69f92e0be2e68b53a98
-
SHA512
cfea200b2362f509db1bd6f424b83c89c3be50d4b5005388191f2eaf57bb69c0ceceb83b7f67f577253877add3aa8c403c7261d7cc8f20ca0f31f3224a3f9d46
-
SSDEEP
96:KZaKIifmrg5foctItPFf7s55wn3ZkunvuXCZDf+:KYKQg5fofK5+SkGgDf+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 948 msedge.exe 948 msedge.exe 2600 msedge.exe 2600 msedge.exe 2884 identity_helper.exe 2884 identity_helper.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1728 2600 msedge.exe 82 PID 2600 wrote to memory of 1728 2600 msedge.exe 82 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 1804 2600 msedge.exe 83 PID 2600 wrote to memory of 948 2600 msedge.exe 84 PID 2600 wrote to memory of 948 2600 msedge.exe 84 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85 PID 2600 wrote to memory of 2652 2600 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\efa56b67953404334423e6f85e9782c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28c346f8,0x7ffc28c34708,0x7ffc28c347182⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4891878393518985747,17179119867899735906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD519b905f0646860b0e2c21563a34c30ee
SHA1bb9240b81c8bd23e35593eb14f9490a8c117fa6d
SHA256b608f7070dbe63e7f9baf3fac39d1fe3da3770fd277622f974ef0fec3e31adc7
SHA512d86f71766d66c668e72bd283acd9bcf4d66a3fcfdeb47d7bd61f67f475f46576044e9f56eda309f635a9c055c299d5e418a3983ac7cddb555e0347ee91ff1556
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
321B
MD50c912e7b674da5bfd872797b34fa8721
SHA1d1b959c13e32b31e18aa2be2761fcafc150b28f0
SHA256cb04599cd3f771a0ba922e7a693273669a36d28bb902c7ea9e14dcbbfd8a31c3
SHA51289136dff6e81b58ce42f47c2936d289b1dcd1bc270d2cd0d347eca8c2e9a8414f4dd1bb0b307e5a683550222abb5a599b55b3a5f1605add25818123a954f3c9b
-
Filesize
5KB
MD570cebb6c6d7977fd378266529d6deba3
SHA110a4a91b1234197f84d971ef1ebf3d231a701739
SHA256e541e52d393f78d3dc78ed6023b7d8af43fc0ff7304c397b3c74064504ae8c64
SHA5122fd9d7455e6c321c5f4540e7354a616d026d787b380bb6f52e391ce191826fc0453d4872dd758c6b3f3b839b782bcfafb9146bfa4c0bddfdf08a913d0a1ac8bf
-
Filesize
6KB
MD500fb3cba7d5cb8f8dd2a8104e958b716
SHA11cd7e9205af0995d613d1093d955eb271d52f439
SHA256c8b47ebdcaab816b7da0b659e44989d27df7821531f93a185ce4c85c973d8b29
SHA51249d9d12cf24c62c7bbf88815c415c3dc579a4f77bc161366aeb9de0ece66e22bcb0126b756e99e63aeb4c4cf9d654c098fe14f0127702bf1ab206c697becfc24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bdd6ad6f0bff587cadef05693168c0f1
SHA11fafeaa35e9a9ee3afa58355b2abced6a295dda4
SHA25657ad378fa76c323fb59926ab39640c770dea0a94cf5bf3a8279a85c859fb9486
SHA512249ceb55803262a7c2b76311f505c0455ff1bd53e55e9a7e31acfa82cfabfca3343877c52b278bceabbe12cb2e2c86531e7cd54207bc322496989ccdf1444ee8