Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
-
Size
27KB
-
MD5
af52459f2703115a35bd0115a9d8ecff
-
SHA1
cfda32ef758063963093ea882771459a74d0912c
-
SHA256
8acd490f2817a2657a492b4c1457699103156c57119cd3f492c9ee8e90fef7bd
-
SHA512
fd57d73655bb2531403d56ba26dd350c3faa5d8706a4eef1bde72ff49547f007e46feb6ca23847deda8a659ea332c28d35b752d377b8d0244e5b0299706c04b9
-
SSDEEP
192:bxl7vFZ7vLs3b9TsVi7NaNejPAfSZWfF6nWflEVUwbWfZ4i9rYuWfJ7Wf2QReEgs:b3fjmb9lHPnV7wx+J3efbbm+r8wkFM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 3164 msedge.exe 3164 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 1712 3164 msedge.exe 85 PID 3164 wrote to memory of 1712 3164 msedge.exe 85 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 3980 3164 msedge.exe 87 PID 3164 wrote to memory of 2676 3164 msedge.exe 88 PID 3164 wrote to memory of 2676 3164 msedge.exe 88 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89 PID 3164 wrote to memory of 3996 3164 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb5b46f8,0x7ffffb5b4708,0x7ffffb5b47182⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18149538616364522686,17823419815504247361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\49e24205-4a86-414a-9b83-d1eae1535ce8.tmp
Filesize5KB
MD5db1ee95c549118adb76cac19a36ddd75
SHA118ef53610686bf449747bf043ae72fb4d7d562da
SHA256ce258b9b5185ade53f5a03459b526f132f8e375472eb88f5463ff4b62cdb0016
SHA5127e7f339903d191fcafb004dea665d07c0f30d5693a9214b473b5613c693134d83b79cb4887f2205ba369d813d95b83e05611be7cea770deaaf3e71a3045a4003
-
Filesize
6KB
MD54c7cdeeb7bc1aae6c33a19264284bb39
SHA14774560de431e73c531a34e328b1d0736966d361
SHA2567cdf6b1af517cebf7d8b142f20cbed55ccea546359afa0d5314bc3057af69af2
SHA5127b12b30dc59d12796997e153f669ca3efcc5948032f5ecfcae175ed7d98f83bea5e1afe2b88a0a9314cbc66719891b0fef52feae708c7d474e317bb66c9fcb01
-
Filesize
6KB
MD533531aad8798e429c008f5a1343d0d9a
SHA1fbb35474371e9d1cc2de2891487b42caf0ea1169
SHA25669c6ad419c61ffc3196186b0dc11f3d8ecc7ea3754e227716217d328f155999c
SHA512eb5e8b21bb5cf1e6bf1a005070c8464efbcb77616452f3b79003485637f54bdbccf81a7f07b7e3a830d36437d358d797265dbdd9aac86bfb836e6b919cb316dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a51770c7e32d382cca045916d004703
SHA11f6452acab1f982ed3cca1e3ba203094985cf310
SHA256b10052f47553dfc846bd2cfe3c0eb44897dd4eec4e52e3eeffcca0ae85678ce8
SHA5121abc75a540eb374ae08a4c09099df20ea528c6e32ce2a7b4a9f4d7820416d3c51dbd7819c0894ab85289b975fd4659d5f20b227a9172bd7425f6fbd93ba77fec