Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
-
Size
3KB
-
MD5
8a7dae777e93866c0cbe7381ea9f5569
-
SHA1
ae5f29626b16a48782b825078a8e3ef593c89121
-
SHA256
99b4ed2064aafc5f3ef4bc0530deb75c50446e614abc08b3856854b46e76c996
-
SHA512
f381ed348211a6e5c5ab37d946443cfd02a0af7375c5b33b0ab496dfd08772b525084cb9ac556c7bad1702f5fbd0b4e3b07b514a9840c2a0a7a6f6e19406ab7b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4212 msedge.exe 4212 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4876 4212 msedge.exe 84 PID 4212 wrote to memory of 4876 4212 msedge.exe 84 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 4560 4212 msedge.exe 86 PID 4212 wrote to memory of 4560 4212 msedge.exe 86 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87 PID 4212 wrote to memory of 3700 4212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f47182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,421567549161790060,4449209115135827278,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
6KB
MD583d9a978c6d20a0d0967a0eecc875671
SHA1e6ef6defdc800fc94aaf123c1bcf7ed99ec1c665
SHA256411209d77efe183b6370cdd5ffb24b20c923d7e39693a5c23612c7999478196e
SHA512b278229a6aa99c6be6ee81927fbe654f9bf8e47d793648f5c1e9ef458b7b2931c1ec2b81a9bd24de16a4ed5454311970f67d77412f830f25ccc1ef48e69fbfa3
-
Filesize
6KB
MD5ba2c6007a7aab4b70c54af0030ae6b1b
SHA1b71fb17ae35f667d5053f48a39e8dc4a33f4c8d2
SHA25616145a80c4f8a425548b0207c82127e54dc0d296184edca8646217e80a205c20
SHA512b860aeef8934a09c3c4e7d186ef0a8bb48691dd6256299279e4fae7894de65b90f2c1b673687f195fd32c1bd7d78aa77a56ebc28a03dcc149a313f13babb3ac0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54df2461c924c25cb83cb8fca250963ec
SHA1e12d55a16318cb52e6805c91f3e62f87550a1d22
SHA25623a5f9275cbb1c7dbb95370cb7090df91f7ea6e707db6243532f059af164e0d4
SHA5129657ea1d9525083dff1783d19194f2c8387c4d48d69ea08738924b374ee498a2d7a8693e6d6614312e299815cfd1e76186f4178a3419dc2f8551268a0f380bef