Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 01:49

General

  • Target

    28b1d19c4fcdfe009e05f36bcaa416dd_JaffaCakes118.html

  • Size

    139KB

  • MD5

    28b1d19c4fcdfe009e05f36bcaa416dd

  • SHA1

    edb5abbb8182e111aed4a51d7497aa5e2c4ff8e1

  • SHA256

    e63879b9ea7913ec3772587c9d5eb3467177350846f4717a973e316207860d8b

  • SHA512

    d8d38f78fbf157627be46690fc072089e3302521162189a88c21aae97751168aa6ef16cd8d8682d2a76f6cf77f813b33a0e5a607827e931d4834f1ca09f801dd

  • SSDEEP

    1536:S+OvUCWVUN6oCghDCgd4Alyjp2XyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EXe:S+Oi+r4SyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28b1d19c4fcdfe009e05f36bcaa416dd_JaffaCakes118.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa907c46f8,0x7ffa907c4708,0x7ffa907c4718
      2⤵
        PID:1316
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
        2⤵
          PID:3704
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3732
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:8
          2⤵
            PID:4944
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
            2⤵
              PID:1772
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
              2⤵
                PID:1412
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,15666838632906837608,2010420194326800240,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:2
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:5084
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:3832
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2060

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  d7cb450b1315c63b1d5d89d98ba22da5

                  SHA1

                  694005cd9e1a4c54e0b83d0598a8a0c089df1556

                  SHA256

                  38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                  SHA512

                  df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  37f660dd4b6ddf23bc37f5c823d1c33a

                  SHA1

                  1c35538aa307a3e09d15519df6ace99674ae428b

                  SHA256

                  4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                  SHA512

                  807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  111B

                  MD5

                  807419ca9a4734feaf8d8563a003b048

                  SHA1

                  a723c7d60a65886ffa068711f1e900ccc85922a6

                  SHA256

                  aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                  SHA512

                  f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  477B

                  MD5

                  b862197d3ab5546194b1e85a840191c1

                  SHA1

                  02379581b2bb23b901e4a71e5dc54cdffa77372b

                  SHA256

                  c14367b811137a7d91d580a775d413f0063288ea406bab5f00aa1770a689abe1

                  SHA512

                  efe4fe8a86506b9951bb32b21988fa706ea23038fac07a91bf28495efd24601f777f54797a9412a6157b22b0823d5765705b4ded925c28b0c6e2879140c7c5e7

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  60523d0fffdd844d1c2c6932f7249c08

                  SHA1

                  7c3489f8c3ff73b00441ba601cd3c3a2b389c6da

                  SHA256

                  e512164ca43d7249a87beb55622c1d28d9abcd3b9f4beeb17e1c7693d7e6031f

                  SHA512

                  c85f5ddd61f8dd612ad197d144ace046d8bb8238f6d9661e80b1c293fe3653ae0ca94db2473c329bd285a04bdec248ae160bc57e0ccf6bd6e31c4780dca724ac

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  c5c0b55e382db008e28ac0686efdbd07

                  SHA1

                  ddcbd2c5c05338686f11393981d0ffa261adc427

                  SHA256

                  14d9165be535b3f0eb4cbcf388a57f35f083ff07587dfec3dc72be550c17e378

                  SHA512

                  bd435c86311d2f96ab073472bb56dbad04a04fd7dc1ad199e6d4850f5c4e659c25aa9b57c25754d1e7b42e0f1f6f77954c4bdbef5b5e65aad48569bef8622fa9

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  df2f44d6c03a7f953016070b51a041a5

                  SHA1

                  def601e93361c7c664cca1e034df015d0f0f0405

                  SHA256

                  301842e672b6d8231303c927ce5cfaf65a71dfe79958c99ce1bf6e1fcf31a62a

                  SHA512

                  3c3f1d471d01980b3486217a0d2cd7e77a7ed58fd45e0aa4502336c9ca7db832bdb0a98472adc9b0ebade0ef9d138212f2d77f0c721cef08d4ca9d97b581f8aa