Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
eff451e6eed130e1be8d6c322bdd46db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eff451e6eed130e1be8d6c322bdd46db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eff451e6eed130e1be8d6c322bdd46db_JaffaCakes118.html
-
Size
221KB
-
MD5
eff451e6eed130e1be8d6c322bdd46db
-
SHA1
ea7449caa3cf98af5239928a06b028d712c7d6b8
-
SHA256
3230b4c32b7581e646b998798c5b694a3ff838d3b9aa566e61613d457b8c89d2
-
SHA512
d747c1fa623fff85a57c6ea5a3696c3defd52c87889ca156663ef4174d9c7a181231f7007b1cf07b81b8c6a1703878951910d9eec91f02bbd38a3e9595a519eb
-
SSDEEP
3072:9pICF3+AwlxVg7L5HdFnQ3Fnkz7QFzQ/FVWSf:91F3+AwlxVg7L59FnQ3FnkzUFzQ/Fp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 3116 msedge.exe 3116 msedge.exe 1580 identity_helper.exe 1580 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4736 3116 msedge.exe 82 PID 3116 wrote to memory of 4736 3116 msedge.exe 82 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 3900 3116 msedge.exe 83 PID 3116 wrote to memory of 5100 3116 msedge.exe 84 PID 3116 wrote to memory of 5100 3116 msedge.exe 84 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85 PID 3116 wrote to memory of 464 3116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eff451e6eed130e1be8d6c322bdd46db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,6828292464351863044,16241684257693197730,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5496 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
955B
MD5e3e49cc33d7c79d0a8e06569566ee096
SHA12fe796390e9deef3b36001f6a3eb224ec1de4651
SHA256f8fa3dc977fac64cdd8168d1182025b7aef891bb81194191f6b1dec6aa6f35ec
SHA512fe7c1eb56ee28b38989d96cbda4e5176efa331090ddd97dad6a257f06b0c2722a20baa35d0a2ea2c32da071768662b090ef1e80ff5c126369709c93eeb456d7b
-
Filesize
5KB
MD5a84c7efec67f3ed88c24d5610ea8108f
SHA15bd489a001e214976b2792b6c43ec4a739c1dacc
SHA256b3229d4735677b00fdd7df90f8b7532aba8bfe96d5652c0ee17bc3a6511d723c
SHA51267db15bc24af748ac48f1fefa9286d386d29c43a3b2b3df58f8585949a2ba736e8cdd76b840a03d25c2dc59fcdca85d726f4ffb2b2d86397f3dcc09432e9c8c5
-
Filesize
6KB
MD525383b9fc2d895010055422b738f515e
SHA17934f222c51ac98110ebc714dd1cc1a074ba92ae
SHA2569bbcd7728c48f504a8833d393074525da4e014f97999be4752992eaab5574970
SHA5122353dd92e3f1df47c44221b3d0313008e28cba68f7edce8d60ca5e61fd99877d8102acfba1d241f929ea5ef909d6a15febdaeb4911d11920848d8eb6978fbe22
-
Filesize
6KB
MD521155da320b6d67e22ea72675413ff21
SHA1be6a72f73152df074ced8a1f69092413c0d6d9c7
SHA256dd8da150aa51fb39ee2b415659f32bdff753012c669e8685a0558ea2c912a728
SHA512f00a16d04a49b25e41635da1eec2556eb504d2d3c9d4643ee2b52790b1d9dc03ed63ffea3c176a8994174089ab3d414112f3e854942ac5f4956ea6cdf59b6939
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e00b61267071b5f578ba3ea4824e2bf6
SHA1f12dddee1963e87d9874674843aa849a06bb0b7f
SHA25609348d81d026089fdadec4fed5908bb15fdc1d813581c0ab9947d4c175a374f9
SHA512150272fae13613c4d0f5382bf090065a6f29085a53c09c3a8b8ded3bee44b3bd3a7b847862ac0223947acaecf73516ab20dd526f2033f963fec07a6ee5f0d746