Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
f666d44da9e298df370be9033b839002_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f666d44da9e298df370be9033b839002_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f666d44da9e298df370be9033b839002_JaffaCakes118.html
-
Size
25KB
-
MD5
f666d44da9e298df370be9033b839002
-
SHA1
5be724fc341ed62e5bc48a63495a0e7bb6791da4
-
SHA256
ad624768bb0eeba42d3f3e8193b51eb7301b62cc14175c8e748a93e076f18349
-
SHA512
ef1128d86da1fcb74e06ae3ec67db986e7fe132c2a025390c7315150939e724d76d331318face93c939b5871e065dd398e04b96db3600813f4238eb14da38ef3
-
SSDEEP
384:Alh+hGwOE9mDkZwfw2vsfS/O6pMONFIl6ak1iMCJfprjGcZJwX0YIoqG8jtuquD7:+h+hWaqifpgbcuBu/csUfP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 2588 msedge.exe 2588 msedge.exe 4800 identity_helper.exe 4800 identity_helper.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2316 2588 msedge.exe 82 PID 2588 wrote to memory of 2316 2588 msedge.exe 82 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 4004 2588 msedge.exe 83 PID 2588 wrote to memory of 3900 2588 msedge.exe 84 PID 2588 wrote to memory of 3900 2588 msedge.exe 84 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85 PID 2588 wrote to memory of 1448 2588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f666d44da9e298df370be9033b839002_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7170345685781665912,9511903989755963895,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD544f3f58b93254f4c24556ae2d74e8fdf
SHA1ee42443d26efea4d1b258f91fbeaeae085aff67d
SHA2561180158d2324b04b6b8f492f8e553247de7287c731a3022be203aaa5a4097e91
SHA5128ed04ba3f2c1ccc07862803a5b143cff51a59b8469ab09fe768c6a6a78ae71b5d1fa2850b876e9aa91cd6cea66ce3e0d628b774155f275903c6822f330c7ee4b
-
Filesize
6KB
MD5f0680b57a539bc683691dd8dabd8826c
SHA15c3a9dd0ffeef06c3709290a0010981e97756b40
SHA256d20e26aa20a47fa14f94897a7105906ce17a9b62999015bf02cc609d422c057f
SHA512c093b0b9754c3cc8b466a6c39d1c07130fdcac980840ec8c7f1a260478c69008e6cc7b9befd39e87d2e0b3a2468aa762dae7b3156cd28189d1943cc3d0ddbe24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD590c76156c9363bb80a0bcd013231243d
SHA162bdee1dd18c6d2a27fbeb6684d7619658a1294b
SHA2565ba16c8c77b36c172cfa9cc50d45b3be6c2b5fb105115148f085f51215b43c41
SHA512064f31eb18947e62b9127f07d3961021c6df966c2da53f3be26223f032941c8d1fc1183934129b32fa7db872de5db9718e723a06ccfcce616ae023a79795d9c1