Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
a8a45147cfdda0d34a947d128d3b54bd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8a45147cfdda0d34a947d128d3b54bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8a45147cfdda0d34a947d128d3b54bd_JaffaCakes118.html
-
Size
19KB
-
MD5
a8a45147cfdda0d34a947d128d3b54bd
-
SHA1
d54b29e8bab82f7ad42353a2c0bc85fdb7bfb11e
-
SHA256
759d076e25cec11c972c781452ae813765ca01e8b8ce42d8fdc1cf952cd5e61a
-
SHA512
264f4680ba9eaa8c5599a9f9baaef6a6e8140d7f0ee480e15626a92e64689ec0462223c3ab5c3105ed58871bea16b44be774909e53e53c4303c15d8f90212c01
-
SSDEEP
192:fYak/aQcRE0B/OhqHSU1qycNrfyxdKWhfM8oEyoMHQaYJzPiuQ3/dGe7+9nx1ccW:fGY3u6P1qyQf6LoE/elBdGYEnBO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 4892 msedge.exe 4892 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe 5636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4528 4892 msedge.exe 84 PID 4892 wrote to memory of 4528 4892 msedge.exe 84 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 2840 4892 msedge.exe 87 PID 4892 wrote to memory of 3572 4892 msedge.exe 88 PID 4892 wrote to memory of 3572 4892 msedge.exe 88 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89 PID 4892 wrote to memory of 3684 4892 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8a45147cfdda0d34a947d128d3b54bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e39c46f8,0x7ff9e39c4708,0x7ff9e39c47182⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13391795163702896610,9690568690013879259,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD53a4a028dbe1c89b9dafe5d71cd3db0b2
SHA141115502e5855e261074c46cee30471a6c78c08d
SHA2562d3ab486676dece492602836a45f065af2ea6482a25a286652941fc5a5a8f0d8
SHA5127d34aabe00eff5a96b0f20832cac526d98e3e1d745b547f77e682257d9506ce2d0619920ffbf0a3a27e01de67796b2ac02be05a95fb8a8f40afa63147f3ffb1c
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
928B
MD55ad8e907c46e3b9f0b32be13658e1b6c
SHA1be9468405da4e90d5ea0e6fbcea8c8d1b8617ec4
SHA256244e26017bfd1d859cce3e2f7f4ef00ac2615f83e038c6b883ffac99aee24e0b
SHA51216e620b187999e5c224be01383f6c8a0c013740367b8e217f8e3188f9fe02ea5b014a94b73a943aaa75fce2ec0cdb94e9651c327a89d227d5748b78516f64d9f
-
Filesize
6KB
MD52a8c1b2c4a818e3b311a50d473558ac2
SHA199211b7a0c748a9e64cd2e1a823f358927966efd
SHA256d628afe4a7107ab1941e4ea6b1bff3c651ea13e78ca557e41a614f8200a4b01e
SHA5125e678e8285bb07735ba02d7cfeeed746644866201e97bd1d43a71ce23fdbce569d416543e6df970fc9cec356e50e4926f322c13a20084263e74ff0b758d078e2
-
Filesize
5KB
MD59fda63eaa3081ee24f3d8021eb326960
SHA17c60f007c27a1a10a5bd4990c52f5d7e85babffa
SHA2563645d0ae5fb81ac959175fd03494503ba54fa25d0f60660bbbec229b73ba0e82
SHA5127f9b053bda6e5192e8c4dd5b30d815313e0be1cf5828677f16450ded82c3504e04255d3ec920d6e18036da0c8ead958e2cfd8912d571791bbe3b2dc92a84cbb4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD592d896492c9bf4d4848b0b603b41057e
SHA1055c8b9aa59894729ed8a9c7aeb6840db2f3deb7
SHA256fa08fac6546fa4fc1480face0876f0dcb9d22ae8a714d05638bf17ba14b92c33
SHA5122a451d27bb1ef4147fd5e9091e9b147dce14dfed0ec9eafb10ee0b51cfc11684a5139518fb5a6b9ea6e081eebd0126be0edaee3c4e0690c8d5fa69a377c1e2d6