Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
bd4b82741186e45d9ff809654c736c99_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd4b82741186e45d9ff809654c736c99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd4b82741186e45d9ff809654c736c99_JaffaCakes118.html
-
Size
11KB
-
MD5
bd4b82741186e45d9ff809654c736c99
-
SHA1
f1e9add1a9718bf1a41edb17d3babb66e63ec542
-
SHA256
7908e6251cfb9022cb8b4ccc581278f8960cd1f110ab1007eb48af0eab069b8a
-
SHA512
ab7d9a2f902bcfdf4b0fb8866ee9988e6e578ad48b2752312d3e72d44fdc86570dd41ef052d53a8138dc33ef58ffd266c3e32bf71e1c1e47a984b4c7fe62ffde
-
SSDEEP
192:Q0So/oVV4gDuFFMIdAmkbfll1K86HNNArDNZPtf4isVhNzrX7JA/EBalY9rRy2i2:J/oIA8DiERy2/wLqHA2OmSxtLQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 592 msedge.exe 592 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 2484 592 msedge.exe 86 PID 592 wrote to memory of 2484 592 msedge.exe 86 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4344 592 msedge.exe 87 PID 592 wrote to memory of 4172 592 msedge.exe 88 PID 592 wrote to memory of 4172 592 msedge.exe 88 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89 PID 592 wrote to memory of 1984 592 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bd4b82741186e45d9ff809654c736c99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb91946f8,0x7ffeb9194708,0x7ffeb91947182⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,5453646714396937157,10215086800160101780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD530cbe1f3ca041f966e4f33bfedee5d56
SHA1af1d464d7d748e88def9e57c5175d13e98aaf434
SHA25647577afe7ef6ab521ea774b8db2a1374f5b2f101705358477ad7c01723244b70
SHA512cb53497e745ac851a8ba0f6af1e88ed016fe37599c0696e93b9ca34535609e9ccb2f20c6cee6a5ea7df510edc34f93ae5678817c8767a628333747f220f7bf35
-
Filesize
6KB
MD53039d32c193d493c3974c7397b2d3f37
SHA177aff0995537b525e2f469344fc9fd71fc56fd63
SHA256d427a3fbe4fc500d07574ec42bb502b14e5a64e7c10d080c13a82dd168f447c7
SHA512d8d574005b9174ed1d07d1ff31d3ea60d97b46d8e6ab27864399e7cf5badc2854a15f2ff175c9977db4f148f5f217bb4037e8c8fd1a2d85e64cff5bf525a53a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d0bacbec45318a273f703e15f31f6254
SHA136b0d049541742f7549c8cc95539ad2cf1271ad4
SHA256382899b3b8b555046afca73541e20e09c9044aff3c1c4436d93b08cc3a593bfa
SHA512775aa9e89dcdc1d50ddc4c514af8a9b32c45e29ed85f22b4e36774fffebd03e58584e210c3c6a15748126806506d632d2c79f377e25034fd4b033be58fbcd839