Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
83aaec44c17fd75cfa91cfac307ece12_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83aaec44c17fd75cfa91cfac307ece12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
83aaec44c17fd75cfa91cfac307ece12_JaffaCakes118.html
-
Size
76KB
-
MD5
83aaec44c17fd75cfa91cfac307ece12
-
SHA1
5b776a818b3abe1bff4eacbd08c20553c4115f83
-
SHA256
381a19c3a11d88d8ee1b0b0b42a4d139f8584cca527d32b5026e94d122866e96
-
SHA512
304a1bb358f8feba43be42400c92f5d4bbd34a445de26a8d37dbb73406bddae7d4f9c0a4799711f7706dcf8b9ef099976f8390b9cbf513ea74f3119fc4672ae6
-
SSDEEP
1536:fqIenXckKyCd2ypwgIBnL/TDU3R3/ddvPU6q+KJzftDXFVTYRsM7tHfMMsmDsLN1:f7enMFd2bL/TDzDXFWRdbO7y0tDidG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 5032 msedge.exe 5032 msedge.exe 964 identity_helper.exe 964 identity_helper.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4868 5032 msedge.exe 84 PID 5032 wrote to memory of 4868 5032 msedge.exe 84 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3664 5032 msedge.exe 85 PID 5032 wrote to memory of 3248 5032 msedge.exe 86 PID 5032 wrote to memory of 3248 5032 msedge.exe 86 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87 PID 5032 wrote to memory of 4592 5032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83aaec44c17fd75cfa91cfac307ece12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb6b846f8,0x7ffbb6b84708,0x7ffbb6b847182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13575776231166179555,16481615428818075194,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
893B
MD5441caf5f97495143547a7257b35ad3ba
SHA1e167f2f555ace428ec1584708d842901ed3a2d31
SHA256bc82ef77b72211439b2be1bdeaff5d117ac9d3ae3d0a3039c46d0891f07880a5
SHA512c14114906abd0f90a310c7e75458dcf4a4ad288363781ab4b0ed9433501d31bf48cba9847644e69c978bcefd05890cae215870821b73b9e104871da52abdebe8
-
Filesize
924B
MD50f6cf2f0e8a70d419046659d37d92d16
SHA1c565d9dd72d13e16924f331e69e8f32d118f8430
SHA2568af855ad450413a3b65daaac2b628ac99a238756fd135afd43707de830454a26
SHA512f0dbb1b69fbbe62b07b07da6dc237169e4641893b6766465fda70df798805eb7382763f891598064882daa773e01474fbac6228a00221488170713855e3a54ca
-
Filesize
6KB
MD50fedd800c527aff3789d98507c99f15b
SHA11e0ed51a3c162707955df0d26e6804d5c03102e4
SHA2564dcd6f9a59271ca0a4e5b1f9f763c8ed90a4d170a66c19cc88fa21510ff317d5
SHA512dadc6c075f7c4660729e61e3a4d5ae71e91c36803420c3f8db1ba0be20b65425422bec454154c75c245277c79ea6d08db48034c054055cd319f2396788e0407f
-
Filesize
6KB
MD57653a30c67899a766a4f791e3036c0bd
SHA198701105e69e0b5469f396aac0831819d07cbf07
SHA2568d9ea4fd31f43c34219dc55a5f855d2aa7dc7160f688a671aec92beb1eb8a546
SHA512b06b324a15bf80c8d438774728cf09ff6cffdfcf3317ea0194b626742fba065779a63fe914cdf43782fa0862f3fce177511838c65ebcc625d4c362fbf2850981
-
Filesize
7KB
MD5802978ee925f3872b6099ebc444adfc9
SHA1daac9c4bdebcfd4cd69cdecbbd872fcef11c2648
SHA2568106c6cfad7db670f48d662f174ddc1fbb2297e842333c293a22f8478aaac7b6
SHA5123e095c946ca1e42dd4e185b327ed0a7cf3778108f4bea44daef58a32e4b272d3b33cec29d8830715067e04cb19a6b4d83e8ea043770a12898da1d4d558180130
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c31ceecfd43e0175cbef552c997067b7
SHA16610ab06cceb7e9784f4da6adcdfa768ec3212ae
SHA256720d58e7fb97816f19997308f863a43ebb67bb85fe1b8b5ae99d6163973bb386
SHA512feeb0af219e5525586a075fe7cb4eea824885139a0251c73dd3bc6e4c3d80e53551176038536813dc791916a06f4e98ba4b0138b42b6e6edf5f6077f8fd77d8e