Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
8d39087a49008025e31d1ad99c83beb3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d39087a49008025e31d1ad99c83beb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d39087a49008025e31d1ad99c83beb3_JaffaCakes118.html
-
Size
23KB
-
MD5
8d39087a49008025e31d1ad99c83beb3
-
SHA1
90014c48539bae5ff21293612b1c2dc36eca3cfe
-
SHA256
113ee00e389c4725cf5842a06db9ed496613ed96b040ff0cd50ef5d6acfc4453
-
SHA512
61fbfa3220396241574e4b2233f123bda9d4f61e9ed6233f912dd8844811a1b5ad7114f7d3e63b4b4aba8cdebd805ba2966547844df201d58eca552d8013904e
-
SSDEEP
192:uWHMb5nC9U+nQjxn5Q/AnQieTNn3nQOkEntc6nQTbn9nQVCnQtbwMBzqnYnQ7tnf:uQ/Rmw6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 2816 msedge.exe 2816 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4440 2816 msedge.exe 86 PID 2816 wrote to memory of 4440 2816 msedge.exe 86 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4664 2816 msedge.exe 87 PID 2816 wrote to memory of 4828 2816 msedge.exe 88 PID 2816 wrote to memory of 4828 2816 msedge.exe 88 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89 PID 2816 wrote to memory of 2656 2816 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d39087a49008025e31d1ad99c83beb3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc5947182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17850087729901318523,2412279616949857124,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD55617db36fd39aa90febd595a6a43c04b
SHA1360d56ab1cc08b0ca9408a81a1bbf675308932f8
SHA256cbbf03ff317c2f6da242763fd9d0fabad4c6bf1a106bb51715f2ec52bdc74161
SHA512991b2946de5003a838e5aaaf7384eeb8c55417d09d86c40f5b8a850340f4d618ac1b4bf76826ef68173ab326264993b82847146ef0582b14fbadc6530a56e7ef
-
Filesize
6KB
MD5dfb201b5ab5a02af1f6a91a4025ebd92
SHA1b4e50806ac97b7812620a1482844bbd4c67b494f
SHA25694079d26848628c149e1038f6cb7557426eac23c4e44db2b2fc7e49aeb52f21f
SHA512205db189c3c65ad1383c5a73cd758deda4f798d41773e4401a9b68565910d4f5d6e78e72d1adb6d58564f9313d2689e9b35c34ec0f83ce3d1880258bf5cd2f40
-
Filesize
6KB
MD579571aa3fcd22959e7eeb34d06dd1932
SHA1715f46eb91ac71238d3a81bbd7562e90e3d4649c
SHA256f130c338afd9689edb9ad51c62cd61e0e257a7960d1f2dd25fa877f980219406
SHA51276af73ba18322464c8a630179d37f73b52a1a81cfd56330c036de9487d8f64665c79f6aaaf7dfcbaa77c13cf5b0032a81ca2c38e65d6ba47a2da16bf46c9a3fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d3c66c7707bb55af089d964030920e46
SHA1dace58fe4d6b7a47aed964d8c307885c60760c37
SHA256cd23cbdd57f497657fb0afbb7d3e363c51cfb30664fddcce365c01e9e6944e76
SHA512e8c55e5a5a1aec7f246b731d679f48dfb528a7845f560167f87e9f6e3b1287c99b98f5a7a14ba315f63f4f1bcc5c32ff10c9b9f5bfe3d6a3a871f2ecd28d183e