Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
30a0a649d5f16fc5dac49dd3037baad0_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30a0a649d5f16fc5dac49dd3037baad0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30a0a649d5f16fc5dac49dd3037baad0_JaffaCakes118.html
-
Size
38KB
-
MD5
30a0a649d5f16fc5dac49dd3037baad0
-
SHA1
b438834809ca6ce4601499d2e275cc300c1259d8
-
SHA256
ea92dd90a1130b428b23278ad1e08301ebef661bcee202708c10223ab6e680a3
-
SHA512
65450f760dede2340e384ac68f3a753a340292b1303946be54ed432ac3adec0e3caa02c61a51b1d1bb8f39f2e87d33b53ed0459d8163eb6be15ff24da0270913
-
SSDEEP
384:HjpHoB9VEsv0Rl7X3BqU1VpyFTrzd01KIyBLDZN6ANBVSILVfIRaGiiHm:4fvCljoAVpyFTrzkAJYTm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 688 msedge.exe 688 msedge.exe 220 msedge.exe 220 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4824 220 msedge.exe 83 PID 220 wrote to memory of 4824 220 msedge.exe 83 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 4104 220 msedge.exe 84 PID 220 wrote to memory of 688 220 msedge.exe 85 PID 220 wrote to memory of 688 220 msedge.exe 85 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86 PID 220 wrote to memory of 5096 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30a0a649d5f16fc5dac49dd3037baad0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd31eb46f8,0x7ffd31eb4708,0x7ffd31eb47182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8410834615494084771,11420047588848116464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD5257a2590e82a62aa947216e40a6fcf17
SHA1f4b7bc44aa31312e0d042e2f340648ed8d2bea43
SHA256cb90297576f012d52e52f339d0632bf106e90b3fa374f3528e03ee82fd8c065a
SHA5122279ead2f081e3aca1d64127e89a1d003aca50d7f3215a81095e41a9e6b78ab2c1111877daca8557429b837ed6b85c86367850d974efcfff92cf6477aa37cf26
-
Filesize
6KB
MD519157c07dfc29d6725a336e8b485e219
SHA129a7d0ee5ad7787c964dcb175e98dfc9ac6de03f
SHA25638e66ddd7e7fc133f4e0da57d8e9a6f4f826119b5353d849a7ac2cd44675f3e8
SHA51255481a0d5ee52e4da11a381b018bbcee015ea3cc54ceef4e47ce2dc28c5478fce596f6390d40a79bd83aeb7a998272a73d1eb6d174bfe918a3a8d2c226814822
-
Filesize
6KB
MD5fa3fab8426a5c725f8ae5b8aefd446ac
SHA1eb670ab5ca207b45a3aa9ec9de692ab42cb74ce3
SHA2561a874fc93cc78d4b2fb12132ec62919551820ce743c8185380caf8206c9a8ecb
SHA5126fe4919187e1573f2ad841dcbb8ff4b89637427ecc57ff675fe0195afa25510bcc0a0b7ecb7f3c0ddddd383fb25616923a2c4b14750a1c53f8ba6ad76ad02082
-
Filesize
10KB
MD5b3d06fbaea94642d8862b4397585e5c5
SHA1583376e23ee4e82be27cd562eb853c9e54bbf361
SHA256a3eb0e6009d54a2af802ab87475abfb7f4f18a545dc24a1689456f67fd455183
SHA5128ad80f3697443a80afe63ef522a41eb04c8d4c85bb96abdc497a97e5944c681c12930c444f4ec77b8fac19e9c8c49a9bba5fb5e3a1a98d16959a374ad000d220