Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
b1062d5118a987cb67f9e2957716d12c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1062d5118a987cb67f9e2957716d12c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1062d5118a987cb67f9e2957716d12c_JaffaCakes118.html
-
Size
8KB
-
MD5
b1062d5118a987cb67f9e2957716d12c
-
SHA1
b73e33520fdf7cbce444fbea8b4721d157fbe586
-
SHA256
56aa5489a480b020f13ef025232793bb3b9e35f57777c9d2eb50d5de06f2c525
-
SHA512
599548d689654b7e254dcbcbde941542d71689a2904200f68b687d2ba8be3398f4f78f2bdf9dd75787f9d6ccd54ffddfef7901b954f4ff954adbe710520825d5
-
SSDEEP
96:efVJaLA9H470BHU6gDb73z0Qtdy7w3OoTpr78d81+R/5l/6VwS:efDTHq0BH6Dn3YWWw3OTd81Q/5l/62S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 2984 msedge.exe 2984 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3052 2984 msedge.exe 84 PID 2984 wrote to memory of 3052 2984 msedge.exe 84 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 436 2984 msedge.exe 85 PID 2984 wrote to memory of 1912 2984 msedge.exe 86 PID 2984 wrote to memory of 1912 2984 msedge.exe 86 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87 PID 2984 wrote to memory of 4696 2984 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b1062d5118a987cb67f9e2957716d12c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a7546f8,0x7ffa0a754708,0x7ffa0a7547182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6971938762977915872,673778252003912924,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
309B
MD5c07d51e121134420015fb31c8d4cd239
SHA11c02a52dec5eca030dd7d09cb99edf7c9e07117b
SHA256eb907f1c715acecd8dd0e8a82a0528d2864e37f54a8af263b95aafedef8d51ff
SHA512ed26d4a29f64db90543fd5d46528f154729e355b65c4bb7292e80dabc9203bfa3b5c7fe2b2ffda5948a699d16004190bff65bb7bd93c86589c96605cffc0fa6f
-
Filesize
5KB
MD55cf0e29b5c39e3929649e2fc25d53448
SHA1753131bda401148ddd0432653bdceb4a72ea00c7
SHA256da5c977a578ff8ff4590138d7a936be439496a6285619ac375ea0302973e1b29
SHA512c47e88540f618c99862246ba22c13530b951e8b93103da16ef61b04b53db81edcd4ddd7531c6461d3e9cc92840df5a9d8b4ef32ea858a062d4146c3966831d74
-
Filesize
6KB
MD504d4bc10d3577324b988993883200dbb
SHA1badfa37bf3976083d44453f957de89c2f7799fb5
SHA25652e6e68782056d09217ce1cfa806b0dc109013fe777d29c3553eeb9cbf5c5c92
SHA512bce2d7e174931e2b7ac123f0539a4a2be8286fb2b690f8b36565a9376071d5d96593c98773ee8571cf1173a433829782cbb25c48287d3feae0de852ebd77db78
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58b5ea8504f77f9f82f15137e4e19f5b6
SHA117845b1ab9243e8ebcfc7a893ac1dd38fefb8469
SHA25658c8bedf07deb78e0281edc77ab350386b5e8438c0426e4e9ec2115ce2d162a0
SHA512a986516345c82edd59b0b67996cf0df45abf91ce1641176cd7f308ee899f37836e85779a7a341662ae1df1e01221c758e5fc99f7b6c6c5f780820533a0560482