Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
4334f7c0ca5b963a76646fd47cc3bf77_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4334f7c0ca5b963a76646fd47cc3bf77_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4334f7c0ca5b963a76646fd47cc3bf77_JaffaCakes118.html
-
Size
25KB
-
MD5
4334f7c0ca5b963a76646fd47cc3bf77
-
SHA1
7f8a35614ae4d817d1bb646349cfcb6b0d4bfb3b
-
SHA256
62a130380f60037756e4de34ad6581d6bda7437e6c4f1ea3580e453064386b8e
-
SHA512
2736484156112f4ff1711e4a1b410d54e229d6a5b2ec3d792c276a640f792bebd790fc929ff92afd75155a8fe6ffa578cc19ea79fea219b91e8eb4aabf60f12f
-
SSDEEP
192:3ZDqEuCo60OBnod1oQvV+p3PCTjfuKNiVZ2xJq8HOya1yUVV7lvbFSn5KcyKLjJt:pOpnaAwxwkwmg/5/5N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2892 msedge.exe 2892 msedge.exe 3040 identity_helper.exe 3040 identity_helper.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3416 2892 msedge.exe 84 PID 2892 wrote to memory of 3416 2892 msedge.exe 84 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2280 2892 msedge.exe 85 PID 2892 wrote to memory of 2340 2892 msedge.exe 86 PID 2892 wrote to memory of 2340 2892 msedge.exe 86 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87 PID 2892 wrote to memory of 3780 2892 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4334f7c0ca5b963a76646fd47cc3bf77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d4646f8,0x7ff87d464708,0x7ff87d4647182⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17962289956432211823,12913211916868956517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD58b93dba7adbc3563c1ce435f8bf340f2
SHA1a61723c03a2c41acf60a3a882a34c65e1b81c122
SHA256d895c9849fe40b093d4b3f715a32e3b033e820b355c76d42e84f9736d4607331
SHA51220f32b9caacf6a34f427cb17a9054a00dcd9203c4009b9d6c73145f4c93519cfca19cdd33cc50458fdde58a54f24f6977bfefb19ec186696e4f61ac36c42ce4a
-
Filesize
6KB
MD5d057586eb638cf0dfeb9007c038fb767
SHA1369415045ab070b54c148c56877267c4740553f1
SHA2565aa835c600077a9a3b263e0148acad49ae8782864d45d09a254fe510058f4850
SHA5127825c0e3819b4f6d16404206698b2ebcd8569210453de803e46f10b0def8ba51d3f6492211ad13cedfc140e9dd30965268aab338d40ddf6551be6fb039aa3b11
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD510820665c3595d1fc667ea679f92034f
SHA1ad6df229c1bb2b9b401f03154d3848187b8fc50f
SHA256429757d6342016ac94584727599629f11d2aea2c11bdd80f13e34a2636379b6d
SHA5124c9167b5a15214eaa056e5506c20775410a21ac3e8953864e3121c9fba5095a89e69d55f921adcb6e17531b4ff2f79a665c0c4eb6685f4310a2248f7c3f5d0a0