Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html
-
Size
5KB
-
MD5
55f46c1f13db41bcee0f6e31f5865605
-
SHA1
09594ed85b9f6c2159c469ffb06e5c6f143836ca
-
SHA256
300a6af860082c7b398a54bbbebb4e310fbdfd0ed837ea802cfdd13e9509ce05
-
SHA512
f13ab120b652e4a64d24452fc81f810cf945213040834377adf93f408cece1eb134ffb17d99e8caed0230a62ae4fdcb68437c94c2688b401dc7abd3f122991b6
-
SSDEEP
96:QMp5qxWQpeDXWd5p8JtRURBvm+TsjDKMDKHDKQlswx2NY+g8TCwECRfE06U:QMXgeDXWd5p8JtRU7++TsjDKMDKHDK3f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4912 msedge.exe 4912 msedge.exe 1776 identity_helper.exe 1776 identity_helper.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3024 4912 msedge.exe 84 PID 4912 wrote to memory of 3024 4912 msedge.exe 84 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 2424 4912 msedge.exe 85 PID 4912 wrote to memory of 4044 4912 msedge.exe 86 PID 4912 wrote to memory of 4044 4912 msedge.exe 86 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87 PID 4912 wrote to memory of 1992 4912 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\55f46c1f13db41bcee0f6e31f5865605_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998cb46f8,0x7ff998cb4708,0x7ff998cb47182⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,968200166378945059,8586697775967290805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
5KB
MD54d1d95dfd29fa3070abab49aab9db9cc
SHA1effe4db5a46dac4a44f0b5686549eb2efa97c8fe
SHA2569377b6b37f7c55d12ede5c64422ba7c987130c7cdfc9a56e2f44941234479a26
SHA5121040cd249bbfd0005894c94a45156f7e71c060f1f92744050c7ab9bba8499430b858016bd3b7e53790e0f5bfc9de7a0f609537046d8418ed837bfc7443261c31
-
Filesize
6KB
MD5cdf19bb97e2bfc4a5ab38d60124afdf0
SHA19817461da6509ebb8979d47e04386ca2a0ff8321
SHA256228bd73c2ad3af83397f8d2c26d0c309fbe3b2d7308fcd0320e89e9b9ca2c82f
SHA512858f0783e575575ffab1793ffb42af26da95bd69b487db971b9178356ef09674b802326d396c66c183dd074d4ac3fa92c505fd08d092d5db7724d66edef3a952
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f0be5ec56cd900d98d0350d0a5aaa09b
SHA1138e9ede891c81858784fbfad3ed954e9a547c5d
SHA256cd4769157cb1957a933b3eda0e88f049d7747237805c94a82111d510ed3b60ce
SHA512ecab719d27ebba29aaedd34d7e1ce8cb3e862f27e5732db9a026fb058b8ecf6d964c440e3210fcd86a75a6a37694ca9454ac4c1881809aea88f94c54a113147f