Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
-
Size
10KB
-
MD5
81cc04f66d5fc2c2f0426c67a0668825
-
SHA1
35c2bc196a09055dbaf45a7ddffba551c9667d25
-
SHA256
501aef94801d408aa47c6e5f0c472b00a540d1c3e21f868a69852f5ade179cea
-
SHA512
25f2edf81e672e629585d80f60596863b144a69ec400060c7402abe10d0fa1fdcec76790fa7cd75ba002e633c97da88180c5fffaf5361b54187dcb1de52cc347
-
SSDEEP
96:uzVs+ux7dILLY1k9o84d12ef7CSTUOGT/kQWX8phDfXBDfnuD/HlVHcEZ7ru7f:csz7dIAYS/TQgChDfXBDWDPPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 2788 msedge.exe 2788 msedge.exe 4192 identity_helper.exe 4192 identity_helper.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe 2788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2492 2788 msedge.exe 83 PID 2788 wrote to memory of 2492 2788 msedge.exe 83 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 2972 2788 msedge.exe 84 PID 2788 wrote to memory of 3272 2788 msedge.exe 85 PID 2788 wrote to memory of 3272 2788 msedge.exe 85 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86 PID 2788 wrote to memory of 3552 2788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7fff410c46f8,0x7fff410c4708,0x7fff410c47182⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17256849912940126593,3979012392631023178,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
Filesize
6KB
MD51dc1a37d81142aab301563b0f9459430
SHA1f284432ec27c804ef4af0e73cceb60b106e12e93
SHA2565560e596e1a17abb5641f1264d4da7dfc900a6d07b10fe8890307c2cdde5be29
SHA5124e7b9863cdfb30e47436e9c9a2cdb2505d23810e2c0a8ee76cf2efabae9e7122f09f3b1e94e7db9458513ae060a5a095b3aa7819dc33a1bbe8939d1059b623c6
-
Filesize
6KB
MD524d8de7e1874881317f3cb11a237dab5
SHA162c9824f05173710d4377284499b0cd42e7e720e
SHA25671487c603286b0b7ad8f8688c65af38e9c5d98840ca8fa1bc2511c88de6e5844
SHA512dff8df2204beddafc4a1bdfcc67e9d86c5df6dea6270fe94d5f0e8d71d56ae94952e0470f709bf7d878f4896a70a0cba80db57c837534eaa812ec747aa7a272a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5499dd614c2d466e3455ff4543b68c7f4
SHA16688fe3ce0f34e64f60090bfc0ca34904e9d97ae
SHA256bbae14215fa189946838226d6a33e06bcc488fbf0479b879b3e63de1ceb5a224
SHA512986e72f9d6b0b593c3df5aa3611c61411cbca712cb6183f68494c5012708ae9e121e75fe4a40d82b82d0d96b20e6d5b9c986c84c758d74f6d66dcdb06563f182