Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
f4fb775cb4bf8e461709a50d234defc4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4fb775cb4bf8e461709a50d234defc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4fb775cb4bf8e461709a50d234defc4_JaffaCakes118.html
-
Size
4KB
-
MD5
f4fb775cb4bf8e461709a50d234defc4
-
SHA1
b44dfd9c588dbf26c2fd63009a470eb6e833327f
-
SHA256
a747fb501146944c71b1e18e8a09a0a6c27691c2c6430af848f116c18a2d9b8d
-
SHA512
b549b325bfc42d9c05659faf67d79bac3a0af27f3dd98ec04d41d72f5feb7407cc2daa0f6f30acdbf215c16c5a006aec129a197e0bba586d6b52abd7b5606cf8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o4H7s48r:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 4892 msedge.exe 4892 msedge.exe 1920 identity_helper.exe 1920 identity_helper.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4752 4892 msedge.exe 82 PID 4892 wrote to memory of 4752 4892 msedge.exe 82 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 1456 4892 msedge.exe 83 PID 4892 wrote to memory of 3056 4892 msedge.exe 84 PID 4892 wrote to memory of 3056 4892 msedge.exe 84 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85 PID 4892 wrote to memory of 1480 4892 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f4fb775cb4bf8e461709a50d234defc4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb02cf46f8,0x7ffb02cf4708,0x7ffb02cf47182⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15424438879214366151,8372692609296025787,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
292B
MD54ebbf7f05e572a3979dc69f865737eb0
SHA1d1c6b25752277ab8d3af772f2852f3e7b634c55c
SHA25678eff392981c40dc4ad2deb4dec9ea3834674e1855d4c56c357a5adb1a6eeb8f
SHA5120335a038813e2ad0edf633796f86a0ddb143e00b7edd577afb52b2276d1decaba2fa6b05dc8688e05ad098fac1976f0a52dcd7bbac44592178cccaf2523c82e9
-
Filesize
5KB
MD5bfb0cb299b6c92337d65580393a8e499
SHA19c66abd2551f2efa450a9e5b5f2d66207b080a5a
SHA256cfbdbe7d528c981587f6308f560e6fc156c7e1dffefcc767110d7e8c0d8cf6ee
SHA5125985e7cd676e5ae3cecefb012c4e63e63fa045ecde06b40bcaec3e15a512c8c621ffc1479704b999da3be30357cd2c5f5d562a728eefef3d5133c47173741b73
-
Filesize
6KB
MD53d5c924fe2fffa66c3a4fdb941987236
SHA13d7093865c648f0e2fde4228bdd0a01089227e72
SHA256adb273dfd0679b2df8372cf211e2c6bd5553f511c0fc5cb42e2c17726c164b40
SHA5128a079a113953b553affb77abdebf163e7383530d9a811a215db8971cd23e4513d0c012234b033db59c0cb52d01e6dcc69f9889fc01c0d7c8f46e7540eabcaf27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD518da8225c06d5bd4480502b9fdc08b17
SHA1fd344b329d924fc1f5dd035d66ecd980b4064d6c
SHA256a50c2d867061e79ac09bea6a23af961d1b525514a3238402e0d69ad629a7c621
SHA512000425b8a4f126330d71d7ccab2b6efe694363228c06dc5e5b44eafe62106eb40efd05f738585d0c42ee07239e1828d3643dffa749d23a56a4dd963d5b896138