Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c57c52a792751c79b17768866a4880c_JaffaCakes118.html
-
Size
6KB
-
MD5
8c57c52a792751c79b17768866a4880c
-
SHA1
4644ce7a4d97d954e1da1966b2e3853a63093be0
-
SHA256
16180643582485e63df2514ffd3d066a6709d6bac6f7cf60bfbf97c2fa5ec482
-
SHA512
e23d31c5c9f7a74e70e6ce8efb98ec7d38fb79f1a11abace74f78d92d8610c9c9985fe704b01bcda9ee7ed6832177b78c0923eb509e49327c30b6bfa40a438c8
-
SSDEEP
96:uzVs+ux7m/LLY1k9o84d12ef7CSTU4sY/6/NcEZ7ru7f:csz7m/AYS/F4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 116 msedge.exe 116 msedge.exe 4532 msedge.exe 4532 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4332 4532 msedge.exe 84 PID 4532 wrote to memory of 4332 4532 msedge.exe 84 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 1072 4532 msedge.exe 85 PID 4532 wrote to memory of 116 4532 msedge.exe 86 PID 4532 wrote to memory of 116 4532 msedge.exe 86 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87 PID 4532 wrote to memory of 1836 4532 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c57c52a792751c79b17768866a4880c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9779046f8,0x7ff977904708,0x7ff9779047182⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5375344152309640288,4165701362388716044,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD5183b94a9b66451916b7d0050ff95a706
SHA162a8358bdfda21ff49beec607b33e1c2a6026fd5
SHA2565efdc219d0d7d3f86c3af5ad679469b8508e4aeaeb9ed705950886bc075efc70
SHA512cdeee73fefe53af69d308f507257f763703ab02a45f319eb1c16b33650f4fd2a377728d6263ef5717b171200465a866b9018517511c737b18302be68a9e9d846
-
Filesize
6KB
MD50c07137d2aa073eb2ccb164699d989ea
SHA16eeb5b90b649c4eb169f4c4397db4cbaf6b5c74a
SHA2562b3aae483d87eea311b686a88e0f0dd01e71639647b9c0d9e60ea51847ecacfb
SHA512b96b5cce8f286353b649d3b2b325bcd891ac259035fa98fc1f926804813e11dade21f57e91f53106632f0bb5c389dd5acc8a0a4e47f7f5c6b8e0099378e8da8b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c77d469f0cd957de2e9cb932a3280e40
SHA174c5b82d507dbe32a91873cea85e5f732d8fb468
SHA2568149cd26e7ab910d64e7bc575580d2b54e87aaff545ee017d70cee8c785816eb
SHA512646613d2a3d8a9875caff4e11e3bb722ad91169ec98e5dd8db43cefe3503aea1a8a5c8e6c485a57a0742e847361ec5388a3c5ad78a6e11aebab8ecf283460dd5