Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
2afa6c1337cc20f4115018cd14e90b96_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2afa6c1337cc20f4115018cd14e90b96_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2afa6c1337cc20f4115018cd14e90b96_JaffaCakes118.html
-
Size
1001B
-
MD5
2afa6c1337cc20f4115018cd14e90b96
-
SHA1
080247c986c5ec8f07e58eef213669f39c3c8520
-
SHA256
d347ecdf8f231bd759cbb3cf8c236fbb9ea488c94efa0dcf8a84ae5470ba7c9c
-
SHA512
1c4fe8b2d157b03fd16c321829098c9d48af11231c415a74ecf1c879eb445e7e34b213fe88c47dee3b233e7d40634e2af8f10631cb4ad33ea199e63e1477c27b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 4400 msedge.exe 4400 msedge.exe 740 identity_helper.exe 740 identity_helper.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 5092 4400 msedge.exe 84 PID 4400 wrote to memory of 5092 4400 msedge.exe 84 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 2720 4400 msedge.exe 85 PID 4400 wrote to memory of 5052 4400 msedge.exe 86 PID 4400 wrote to memory of 5052 4400 msedge.exe 86 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87 PID 4400 wrote to memory of 2276 4400 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2afa6c1337cc20f4115018cd14e90b96_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec9e246f8,0x7ffec9e24708,0x7ffec9e247182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2432 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,10537527527339216432,9409088594666670933,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5e5ec69fac4a811782bfdbe2a55b93230
SHA1974bb4a562cbab1893329045335291272a759148
SHA256226961ff48c21d58058e00dd35c733834a540b8dd4d4789568c8eba82c5236bb
SHA5128a5e12264771e675c38c8949543ac4778c57f436dfa001311325d5c6370ca14f509120ea8dcf67374e687261fdb6ade66c219c289a02e7df1ab3868407ffb51b
-
Filesize
6KB
MD5459139f4d8b3f1fd456d3977ff808a22
SHA1ac3d147c7e6554dc563d71bcb483a107dc0e354c
SHA2562cbef84b1c6946cc9e584915db65d9f49dc1db3120c01e5b10acaad34d33e74f
SHA512d8c7bb5284916f0d20f9b9cec6544d595cd0f7215797a9608eee77f31db05721dd1d01a794f383b2cfadee26987623f15e2955e486fddbb2e8db20d1b63eef1d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5961e6fd53b1c423352cb489a1e304f05
SHA188a51770cc06089735be9d51fd875bdcda7ec89b
SHA256c138af8e33d369368f369d53d6918f7c95cfd237c60b2a81af6007d1a1af0a54
SHA51274667ae4c88aa633f8d8bd358ef14309571d2be4725aaf28f6659d09c0082175bade54d76e0843a53f557d3bbd4981c796f1c8cd119f613fe76a50c06f2809d4