Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
ff26fb0909a514207e7023f91f4032de_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff26fb0909a514207e7023f91f4032de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff26fb0909a514207e7023f91f4032de_JaffaCakes118.html
-
Size
36KB
-
MD5
ff26fb0909a514207e7023f91f4032de
-
SHA1
bf57e6d8b7a9a4c9ef0df2b141b5fea3a3eaf23f
-
SHA256
6ddac315f0519c9931c45f16a591c58e6ea36bf5c89d255f35e0d1445e54a0eb
-
SHA512
1456e415c9b0f6fc08da158f7da677dbe00c3849d973cfddf1b4ed4b972cdb0ecd477ddf95c63a14de3336fad609e73013d9a69e767bbb96737e77c9f3dc6408
-
SSDEEP
768:zwx/MDTHzb88hARWZPXtE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TmZOo6DJtxi6qLx:Q/7bJxNV7uxSD/L8dK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 1968 msedge.exe 1968 msedge.exe 2628 identity_helper.exe 2628 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1548 1968 msedge.exe 86 PID 1968 wrote to memory of 1548 1968 msedge.exe 86 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 87 PID 1968 wrote to memory of 2432 1968 msedge.exe 88 PID 1968 wrote to memory of 2432 1968 msedge.exe 88 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89 PID 1968 wrote to memory of 4712 1968 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff26fb0909a514207e7023f91f4032de_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb271d46f8,0x7ffb271d4708,0x7ffb271d47182⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4276592752800920249,6189051204953086504,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
613B
MD51bd5d03260f80ef51731421f593b2559
SHA1ecf2b8fa4bc41e0dd10c5b51edad0692b24e34d8
SHA256ffd4b89cfa6ef64f48cc0c30b16da903b812b11380545979eb95b22d71dd22c4
SHA512e2c6acf890834b9a672a88f9f08c80203b604f653a2c95b05e9761e25fa6bad7f6dd1945d6331dc10d8b496813506cd83b7d09b1cdd1e3736a49415362eee4e4
-
Filesize
6KB
MD51fa42eb4b22a930696508c08ff67fca7
SHA11d94366ddc97632554607f03bb9146f573ca58b1
SHA256993947cc84c0490a836babd50afb8ce44b9d72bdfc158dc698d8fef6d9ca2771
SHA512004dc42410e4f6798a487910cefa61157fcd640d06d88ea542687246dadf70292abefbeb343974ef8abbec6911a34ea7efeb62b415675150de232835de577c7c
-
Filesize
6KB
MD575f57fa2598c0a6a1c1e128b5fccd298
SHA1e027a5d632ea1835c965e3a0d5279914007decff
SHA2568ad8d566dd388b19023baa362d64e1cc38c8f35957a71bd9a942e504a84e03f1
SHA5129b6b97a20147f57eef1b7ce9b47f2a1084ce9dccfe8434867d4bae61368d806a0e6eb74dcbdac5d5a3fb1f6ad7ea282f8082651fd7b0b3ce32a9e5cbe37c2a53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53fb9e3b971f3e1b681d56727dc2dab49
SHA113110289cca1c81d43208b76021919667965850b
SHA256cf67f7af2948206785a79273e310479796f9f3ce8f541805497ac08e94570475
SHA51237642b5cfe1434aef9358a768b3394fc2c517feaeda233d5ada5248afbc0527b95a1517d1c77b0bff422920f2fc1685577536959c3dbec2e47876d7d1c7b0652