Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
43ecef7a921d6208fd6eb7be19cc850e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43ecef7a921d6208fd6eb7be19cc850e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43ecef7a921d6208fd6eb7be19cc850e_JaffaCakes118.html
-
Size
21KB
-
MD5
43ecef7a921d6208fd6eb7be19cc850e
-
SHA1
b887ec1cdc1c0ce85b6877459280ce8a35ea3d4d
-
SHA256
b8f00d3c1c100b85afc4df49ed72d0cc2b623ff356da3384e38912908c378864
-
SHA512
eac110243883bfcbf97ef689fcaa8fa4010007b48de0133240a3e9d1f471884eb2d1536a49864a9792bb5d2f51137e2f017e7df09fe5a254120d65ad8b274f44
-
SSDEEP
384:5JPxCpqgI3pI/hRJTIiT38I1mumPMn+50:5JPl9mD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 2328 msedge.exe 2328 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3024 2328 msedge.exe 85 PID 2328 wrote to memory of 3024 2328 msedge.exe 85 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 1984 2328 msedge.exe 86 PID 2328 wrote to memory of 4240 2328 msedge.exe 87 PID 2328 wrote to memory of 4240 2328 msedge.exe 87 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88 PID 2328 wrote to memory of 2684 2328 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43ecef7a921d6208fd6eb7be19cc850e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff996cd46f8,0x7ff996cd4708,0x7ff996cd47182⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,5613807665672868192,3792878540146763008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
1KB
MD580defc25126d10e52a70548bcda856f2
SHA1e8e1fc84955ca6f27304f9ca0b8fbad95498d840
SHA2567bed355d89a9de1b3573030ec661e6a032a2606e6bbeec38687128e29e90abd7
SHA5124df3e9209589c54c1bdf7041505db3a5f79c34a3bba77f99d3821becd92ba230c6c57c0b36bff310505cc5e576bf52ab93e3f9a41384dd319bec626511d62e14
-
Filesize
6KB
MD5406a39eacff31527e3157dfa4d90b9b5
SHA12f33b973f8994b5f83f748499ab257c6a39552e7
SHA2566721fb57bda91be3f9fbd3696a98492c5bc22a09f9f42b9092d523c9a0a89cb8
SHA512aae4221b6aed13f0f196f5a3569424b3159a3c8ef7278612b673cb1f0c779d5c4b83407b7bf5a941094dcb298001fab536179d239e8dc4a7a9ed389c73d8e6ed
-
Filesize
6KB
MD556d65c40c070039ff777e72005ccbace
SHA16619e2385cc46609e94677098a8ebd3f360c4529
SHA256fdb044604e1b77e2505e07a6ad76de9b50e28e99dbe00d6a634ff903da7e7238
SHA5122e29de14d16954ff3584f825176540b4af4b6ba162e7c4c683264b7eeb82d6106b1133b15595dadd8860aae5743aebb1507e71b14568f5ef769e088651113fc8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bbb7f22a894bed78d4f72a25e9c41489
SHA1d5d9935d1419478687a5a606876c0b695ec59762
SHA256869ba5a71a1ff9a1d5133a03f17e6a3add8d095f3336cbbd52c24dcce7e2c909
SHA51207d08bf3100d3add4de56d75f79c48bfb053d0ae33ccf353c465b85ae7e8fb7b1f8478e00ca87a23bfa336097c57dc837f13a5dfe1ddbff4037894c4b94d72c6