Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
-
Size
80KB
-
MD5
2a148635bdd8c8ca0ff9d56d795afaad
-
SHA1
124a6e646caa3313ddae9824218701117bc3f0d2
-
SHA256
a451adbde3dba55aae2a71a1b21a89890ade7c5e6de095ce12328a1f6df803ad
-
SHA512
59015129747e00d919cfd41de53e492c7601e27877e1b3874f33e4f4315ae5a1e05791d4ba44723ea775e26aef8653ec38d6c611143ec49f804502192c8ae2d8
-
SSDEEP
1536:x7yu/yM4RUURwPwYQm6kFob0GtEspq/+mtLioAxf7N7350SWMuwK0HsHFR2u7zrZ:5yu/yMmUXPwYQm6kFob0GtEspq/+mtLt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 964 msedge.exe 964 msedge.exe 1524 identity_helper.exe 1524 identity_helper.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 1228 964 msedge.exe 83 PID 964 wrote to memory of 1228 964 msedge.exe 83 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3992 964 msedge.exe 84 PID 964 wrote to memory of 3492 964 msedge.exe 85 PID 964 wrote to memory of 3492 964 msedge.exe 85 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86 PID 964 wrote to memory of 3296 964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93eca46f8,0x7ff93eca4708,0x7ff93eca47182⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3429152517483596597,10969634511124476369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD51907d9c7391ab69ecda0ac16b5327a90
SHA1575336a7ea181043d1ddb492fc4555f7fd6625b7
SHA256a82227987b15b4e1c2c06d62ac8e4ebd3290876989ab86b1ab117b77c2edbc78
SHA512d9226bb666d24218f0ee48742aad27c02183f03434e28cff841d13034f23d21000d299fbbe450ea741e70815745290150654fba87e80ffb83d7123dc1a269077
-
Filesize
6KB
MD56a15a13bef5423d7fb03e38a14052156
SHA1bca4d74b458eeb8553e87c4c14574c6973823b63
SHA2560a9994e31b9a0322cf970f50b2dd307e1a04e68e54f46f857deab50ff7c8ae37
SHA512eb3434fc5270bcb909751b551724a239551c44c8b4a4c2c31372200f9c447b263b0978a5a3c12c391f7e16ffa78de4a99365262582ad12a2cfa167377c09293a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57c4a1b1532013e70be96fc81cbf91efe
SHA1d8be66d4060219d8bf732b9d419085260b10d2e3
SHA256e9b7cd1adbd97fe785dc1cc281a78aa3c73f0efa656d8d7c66fe9ab6c4a67799
SHA512d8fa7309934e381a243945582c51ae8937be663bf7a3b9b679266ff3b6f985342103e47694779ad915bf295c6d2d74b553073a756fad3e756b37c0fb288ad530