Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
aac7d235409204231b88152a20ecd4fc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aac7d235409204231b88152a20ecd4fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aac7d235409204231b88152a20ecd4fc_JaffaCakes118.html
-
Size
6KB
-
MD5
aac7d235409204231b88152a20ecd4fc
-
SHA1
750523c94bcfefa6341753928db56f635f68db80
-
SHA256
54c8d1ffe91c5896c0f8d9b5c54b3f37c8cee4c66360c4c8f5e6c1f948a184a7
-
SHA512
8000e7b88677af6f9a8146d1627009cb4ad0e35dd15405b30ce80167ebe7f7f81b4834350254d8f96e31db05f6f9bb6e40570c38001469d2d92b2c1f9aa85332
-
SSDEEP
96:uzVs+ux77aLLY1k9o84d12ef7CSTUa7aYcEZ7ru7f:csz77aAYS/LaYb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 3456 msedge.exe 3456 msedge.exe 4916 identity_helper.exe 4916 identity_helper.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 5044 3456 msedge.exe 84 PID 3456 wrote to memory of 5044 3456 msedge.exe 84 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 1672 3456 msedge.exe 85 PID 3456 wrote to memory of 2892 3456 msedge.exe 86 PID 3456 wrote to memory of 2892 3456 msedge.exe 86 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87 PID 3456 wrote to memory of 4276 3456 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aac7d235409204231b88152a20ecd4fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff079446f8,0x7fff07944708,0x7fff079447182⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9054196107558705855,16916264397639920803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD57c84e35d59c1fe015def26df9f79c3cb
SHA154cae5b75c76bf61fae991b29dc0de74ff737a36
SHA256ecd9e86da1f4059d02f8e9bc96ca4e677f502c1f319eaec2be80c5b761f855ca
SHA512ce2c40cfdde5934ea1154a34bd717ca8f048c79e306476a5b95f638977f84062f66ec34fc03423327e3046156e1efe7f2b0cd77485ccee72b112cce61003a92c
-
Filesize
6KB
MD5c1ce2b41b33f827273ebb7f876a32aca
SHA196a2baec202ad742013595cf9d01d923ae83cad9
SHA25614234506c750fefa45448e1fa63f0f40e49021b94506d194876d03e922853cae
SHA51216396478ef532c597e3ebeea2b68addb8f90084527e8c2e8321282fa972ae671e9b3bcc433425cd20ecaf7f4d892ae4b5cdaeed21d0753b652ba43380f4b3f5f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59cc8ec56f4b06d3ccea3cac6ef268321
SHA1fe8d307cdc59f27380211c99f706e6c7806d8e0e
SHA256e1320f7538ee0d3d1d018d6203f3f47f673a14aff69265523c02e1fae32830c8
SHA512cef5ae66666a5c06f272219c31f8e7d6d372f5677a1784e6f47d4599a523303d01d27297706b6ae7aeac045bc371a5528faf7b84861b7c739e76c82c175aec30