Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
bda6f98464376b4cba2fe6ea54d8e025_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bda6f98464376b4cba2fe6ea54d8e025_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bda6f98464376b4cba2fe6ea54d8e025_JaffaCakes118.html
-
Size
29KB
-
MD5
bda6f98464376b4cba2fe6ea54d8e025
-
SHA1
1e805b1210d6db40fd1bbda28ad43b795949976e
-
SHA256
f793394d4f1e51c7b4db88e35c736806cc648b07abfa01fd46114715a982785b
-
SHA512
237dd8efb856c55f658cbb81f106a23708aaf7d89604ee2dadd39fd4eed0cbe1118a183ce6f3ae9af004d23a3c73d9311ed64c394d208fb4f6b063d1b651580f
-
SSDEEP
768:xbLWXVNbqMH4a06NjIS0OwYxdzSVMZN1sjLZqOb6FS21k:VLGbqMH4a06NjIS0OwWzSV2NeLZqObYo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 4716 msedge.exe 4716 msedge.exe 320 identity_helper.exe 320 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2756 4716 msedge.exe 84 PID 4716 wrote to memory of 2756 4716 msedge.exe 84 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 1668 4716 msedge.exe 85 PID 4716 wrote to memory of 3164 4716 msedge.exe 86 PID 4716 wrote to memory of 3164 4716 msedge.exe 86 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87 PID 4716 wrote to memory of 1852 4716 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bda6f98464376b4cba2fe6ea54d8e025_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc07546f8,0x7ffcc0754708,0x7ffcc07547182⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15801287096008247616,5440518845250672306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
588B
MD5569b1dde46e17b9c3afedf00d4745d90
SHA1448aae6e508e00640e3a8a5cd8137f01bc51f339
SHA25625321ce5a80e919521a867084bc99c02a40cba3bc5ab0fa59a0c39920646832d
SHA51275f6fca6dcfce41c2a37ba47b31b1b3065e452a4baad9b35ea7369fc2ef5690c008a841105ca161f1c32dd174f696e67fd1d8b675eee27428b1b543fcb499362
-
Filesize
5KB
MD53597e80ac2b311d78d7801d2ddfafbd8
SHA10ab89ad0c4e8a018d69144916d62edf7874e58b7
SHA2560d2182d4fe42c588f4f3e9a79c3cf10327b7752407425da9aa1f219ae6a127f6
SHA512b2c159a76ed5a959fe143927f714f8d44cf3486fffd0cba20a9a0cedbe4086b2db985d5df58841daa8efd0a567bb41e998d3f12a38cee93b45f0694ffbdb285e
-
Filesize
6KB
MD59992c69317f54eae8ba02f2c9478478a
SHA1899a2d14bdf20caf17312225f4bf798e41e70f14
SHA256c7f29a18fc60e584bdaddc26bafae4808a569f2ab1f80711d619fded871fb168
SHA512aa4393f1eb6264f8eb0b3bd906d6b3f285b825d8d28cb36a8193b97e5f52997f75d15de416c17621f291c2056de98c9419d7a6f0b2b67c91d29435e2ad601766
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ee3cf364025128472a6102e7933f678c
SHA1c71977938b6ba1266786b73b32a80991124cfb1a
SHA2563d9e52395640d9268a42d9914a09848db48096022145e08417e44c03f4298320
SHA5126f0407057cae164cb3897538b9e3ef2ae40df7d6c2f948a0dbe0fccf89ecd9744bcbeb7b7ce7e1d99ed1c06d6b114127fcf6827d857e4f8c1f2f86472dc1cadc