Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html
-
Size
36KB
-
MD5
b5cd1a74622db75b59932105f8dac175
-
SHA1
78d1468e2eceeaac08cb0939224ec02e4c2eda25
-
SHA256
0dc6346fd6717369819dc92d0f00a2f9cac3a74056c81f746a7c38a1ac78d9f3
-
SHA512
af4183c626946972f55f24dc39551c3226ee56dbba92a07be266b59de340748bc7ba8d3b66d9e72b3f7733a1fe2159f3386ae240268f4d4e8e92c0b860e977f4
-
SSDEEP
768:9sIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZRW:uIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4092 msedge.exe 4092 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 1552 4092 msedge.exe 84 PID 4092 wrote to memory of 1552 4092 msedge.exe 84 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 60 4092 msedge.exe 85 PID 4092 wrote to memory of 4908 4092 msedge.exe 86 PID 4092 wrote to memory of 4908 4092 msedge.exe 86 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87 PID 4092 wrote to memory of 3556 4092 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5cd1a74622db75b59932105f8dac175_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9864796273754372699,15876293657702800960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
308B
MD582f9db04252a68cc9a910eba03b6ac5c
SHA1a233fbedb0d00d37ff0725e94f015f0a7db3d772
SHA25650bf35d6b2f2102fb2235a191fdf38b1a649ba24132efa60e94a0ad91e2ef234
SHA51234c5f8f53759a716ea404978f124517592c0c0748ad13fcbfe7fcb3698cb3492d566095390abf3f093968489fb782610ee22c4c967bb655b431ec4e3b9656d69
-
Filesize
5KB
MD5226f69bc4a8da51f31809a3f34758d90
SHA147ffd1456b6d9970c9b8fa453c98495a665aa213
SHA256f03e4b3cb28ac822463c95d11b630d9133b19faced9ec4a9cfb07b64f11fd058
SHA51223d733a60adfcb87130d2df72ee7fe82d664bc071ce1ea2d66fe4f3ba28409921468515024293fb851a4280b52994ae2ff4b9ee8d0f8bce6bff63a101ba7d3f5
-
Filesize
6KB
MD5df3537697e76e9c6e0f570efebb7c62a
SHA161c72d4e2fedc19ddf4686af2454b4727f4923c6
SHA256f9edbf2fba8d67574469e255e501585e4d2c05e70e606769565d0ad85b248a9d
SHA51290c98eb5e8126b24ce608434672728045a445a605635cb6bb25c3a1a3036974b80e8ceb7406e9c65305b256461e8b27cc14745e172890b5479f13e5068e19422
-
Filesize
6KB
MD5e2454f915348ab09f157ef5f3477a8dc
SHA194334086e99105cfa2fc74c8d592781b5d876972
SHA256360681914a62160a712c1c19cc1cb955778450908ea116d8ab9837a9a01a06c9
SHA512eceede0fd6be2b40b5b2a3ebd5ccf230d10d0ea2da8b08440092a53734982286c0377bc93ef6e18faa3cda7a0b1315276e12eb2c57684bf23055d82c5f5bed28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5872d16ae4aa3cc9a81226779aab4bdab
SHA1403ee413f36c8427bc0e086962cfc256956e6710
SHA25603d07add64b5164670e102bdfd8756f4c7844af218051275b3c53dd359583378
SHA512d7642a88519f68e69f0770332057a0305b656e14d3f8b4d54e0f3f3ee1c50775896ae0d17cdae5813adad6e392933967a289039e880513e3c5d3d2de36089b5c