Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
a2cf8eae5a6ead4658c022dccd9098e7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a2cf8eae5a6ead4658c022dccd9098e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2cf8eae5a6ead4658c022dccd9098e7_JaffaCakes118.html
-
Size
36KB
-
MD5
a2cf8eae5a6ead4658c022dccd9098e7
-
SHA1
ccfc7c687c551b0c7a997a65adace21a37c294f9
-
SHA256
aaf9e37912fa14eddd865f5a61ccddbab4b998a372d1609027064d2fb8db44cb
-
SHA512
42f9c5aa03931c52ce3f9c313b891f282a6f5f14fc1d976e6b29c62c077e9d5d5ded8db360dcb61ddf810558869675e1842cad4a23b613c73f0231de3db47221
-
SSDEEP
768:zwx/MDTHJR88hARhZPX4E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TQZO86u3l56lLRT:Q/HbJxNVOufSI/d8kK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 2520 msedge.exe 2520 msedge.exe 3756 identity_helper.exe 3756 identity_helper.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2960 2520 msedge.exe 82 PID 2520 wrote to memory of 2960 2520 msedge.exe 82 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 5096 2520 msedge.exe 83 PID 2520 wrote to memory of 4268 2520 msedge.exe 84 PID 2520 wrote to memory of 4268 2520 msedge.exe 84 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85 PID 2520 wrote to memory of 4816 2520 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a2cf8eae5a6ead4658c022dccd9098e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94c146f8,0x7ffa94c14708,0x7ffa94c147182⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7098014098369167704,13046204527158430957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5a2584632ea1885cf5127c283b86def75
SHA125f0f2802e1a7f605944d4a66f7a7ecb456c9ab8
SHA256426f778912f9e5282c90f6c59fffaaf4f8ffd011211b5315fccfa394e4b017bd
SHA5125f8968b0cde443e96671bdfc4bc5db86dd99ee9636d9e56cfc4f47c1685b1ac254e48fd3bda25c4ac11caba035ed56fdeaebc0ccdc4bc94a4dc5b4a5c8462258
-
Filesize
6KB
MD504fec7b97da75da86ca44b4f210e8d8e
SHA16fe939f6dc5a52e7287badccd8c74ab5a14c8fdd
SHA2565ef484d51f644b83189b3cdce526991cb50c8cedc1878d1c262bc750abaa09b3
SHA5124f7204a821cafa5a81d9c2cf2e7047410db103a3ee954fcd2dcf431eab9de170584f9ac51538edf5313aabe9890aff041876886262dcf7b5e16165ea1fecef28
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD51ae7bcdc02a7624670c96c9911fc61b2
SHA1c938d10c3c1c15bddca51f03a8797ee8fc64e788
SHA256dd297484110a7816c154d76b0d0b016ac15bc9c99c72e918fb5b7a079cbff953
SHA512ee914c111ba4e9eb2c57d883e56c2a43f5d9d2f15f734ca89bc7b78890a755d1ba76a1c318481ba8da016fd5058fb53cb318e8dc368e47a383ff3d83f1e394b9