Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
2517ea2e1049cde87c955bea3028206d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2517ea2e1049cde87c955bea3028206d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2517ea2e1049cde87c955bea3028206d_JaffaCakes118.html
-
Size
36KB
-
MD5
2517ea2e1049cde87c955bea3028206d
-
SHA1
1c0ecb1a8a5561742dd21339a3e158590cd12f8c
-
SHA256
24ae9edc0e73ec55ead0f2d78c1a98e840e3d593bc1ce22c7cb76eb80eff15ce
-
SHA512
c384abb779bb8985f3b11bcc36bb8dd51c2f0f323400df3a9fa7ecfd7ddccded4f6d19c3471e480519697a28cfea099f945ff65f4302bbfccc7f5299ee184d6e
-
SSDEEP
768:VQiRINre/gvvvIGx8WF/kqn6u1bB7hRI1CxNF0AfXmPIPpHa/ne:VQiRINre/gvvvHx8WF/kqn6URI1CueHT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1232 msedge.exe 1232 msedge.exe 4184 identity_helper.exe 4184 identity_helper.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2488 1232 msedge.exe 83 PID 1232 wrote to memory of 2488 1232 msedge.exe 83 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 2132 1232 msedge.exe 84 PID 1232 wrote to memory of 1408 1232 msedge.exe 85 PID 1232 wrote to memory of 1408 1232 msedge.exe 85 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86 PID 1232 wrote to memory of 2872 1232 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2517ea2e1049cde87c955bea3028206d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95bb446f8,0x7ff95bb44708,0x7ff95bb447182⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,4139003508292460899,13383846483376951706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
182B
MD5136a8627c9f4b9e2c7d3a90d2556f6d1
SHA1a0950a4a78f7bf1a4d08fe5dc8040d25e5e7094b
SHA25606d0224a7ed0c632fe0d506783ac4be33fdfa3c3b3b4a46dcfd4bbf0a1a08ea5
SHA5122399bbaeaf845478196f713f1e78c222568650d1cddaac47ffd82d93ef2a60d1cc7e40bed100afff0101713e70373793d2608f90e75e471f849888c19c88af1d
-
Filesize
6KB
MD5b719d4ec6f098d8f14034abbab2f7e70
SHA165fe6a6ba5c0618c201559fcfc722bac8ab65ba0
SHA256999dc4ccb99463d034e26024e483f193cb0fc645c1dfaa3fb23a6d009ca35ed0
SHA512bb8e35bd86cb1a34eb6ec5eacdebe05907211ee100bb25ba58d7760915aec0685adb7467df24466e4c18c7eee5d2c3739c27c79acc38b2546d7d35fbbfc771e4
-
Filesize
6KB
MD583e0476ff867c3664e0a29bf5d8d4edf
SHA15a2ba5d8c7231b0bdbfef76dbf35ab22d4fe58b7
SHA25615c3f36a980c352af85ea7638c20ba738b1ef989ae85e70b82c0ca8750276eb3
SHA512a3bbfd60fe1bab8e997d4efbb5a974d16b5073d5beeb4b8d1db26114179c7498f8334b5022d8e3343d6ab8160077c79394f9a1a39020486490160c30207870bb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD583df1727c46c93a96a54239f7b8261be
SHA18d4e68f37b99f90e423ef38674d829d513dfd126
SHA2561299bacbfdc1a23955cef2feed3bcc6f2c51e91007d363ca5ff5c72c8588762c
SHA51244aae593e504bc1fb776c25b68e77c41309c4b09604353b90e96321b00b60dac0599ef162c53568df5919e5964c8884da8dc873a08b7fca37e7bb472662cc327