Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
-
Size
8KB
-
MD5
8db8afc0c5b4d0185b537ebdd7875bea
-
SHA1
9d1af7961ce5ef9ea876ea8fc74eca214cd04da9
-
SHA256
14d82b260cd7288e63850f65c008781510deeb8a78160d5a1f133c26a9ca0613
-
SHA512
9e00f9e460b338a501186bf2ba392fdb9179fe7d411d0824b622183bbb03925f3ded3837ac81ba741bfa89693d6c9e788af1958d32c44e91266f304bba6d1485
-
SSDEEP
192:NQ6qYNPMMnIooSGW/PdPlpu31uNpx8ikiuNphVa6eyS8:Npxz5ZehVa668
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3764 msedge.exe 3764 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4152 3764 msedge.exe 84 PID 3764 wrote to memory of 4152 3764 msedge.exe 84 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3612 3764 msedge.exe 85 PID 3764 wrote to memory of 3968 3764 msedge.exe 86 PID 3764 wrote to memory of 3968 3764 msedge.exe 86 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87 PID 3764 wrote to memory of 1360 3764 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3531675741600944596,4666868322716825232,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\641fac9f-d3a1-43ab-8c18-b97ca02d976d.tmp
Filesize6KB
MD504257187f17c6c030b330406f0d9734e
SHA175b43e63f611e951c75933648165430a1f9be531
SHA2565dfc06bef058bbe8b06f7afe673f1272feafbdfafdafdef28570edceccc2e89a
SHA51252af7c83956b71c9332550e045883a1929af94623cb0542b478b44f610e245cbf67f3cf7c6aa9cb8d3fb8cbd025bad5418fdc0945b831b75ed36d159045bbd89
-
Filesize
6KB
MD53c0fca4cb8b63d517467440db2c29759
SHA1cb0fdd91e6941c57bc62991b3ab43244a686e793
SHA256be0a6078b4a4c41277ec6a4b45f224a78e84e4904301035d52106b87462eca0e
SHA512bb3bd39d4edb33000dd4a501708d0e6ce6850092877083551a4e3e978c4fc03de641fab7e92d10ab566f0464e701c804c7466785708683f07f18fc7c8f704f27
-
Filesize
6KB
MD587d64b36776ef190c4620e259a500f0a
SHA179ff81c35ab84c2fcbc867d375c779a914c3763c
SHA2564a84d34d19ceb9d2b35cdf5ef2e6cfa720689e98acfa9ccd2a7d345e9c1dd053
SHA5128ee8487d635a39d42b28fc9be465379af85cb0d7d5cbff15840522b31b410a4fa7ba7d6c812c6a64f57daed33537f4ab12e1758d12a8e35f7c02dbffbf4f2946
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD590d39053814112dc008cbc1d8676bae9
SHA14f03b43c18008a342941975521c2d8f81c07487b
SHA256097ebc009ca938a2361d06e75cb345a55f1625abb7f6defef89da3e9680d363f
SHA512d955080296c59e8d4b2020f7fb1b1004866ace5ced942e7eb47025b49f9e115d2e458ea548067e62f0dd506172ef92b2659484efaba0b9cd419dee7a3e22f436