Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
bdab5a6b30ec99c1494b3ce92741e8ed_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdab5a6b30ec99c1494b3ce92741e8ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdab5a6b30ec99c1494b3ce92741e8ed_JaffaCakes118.html
-
Size
201KB
-
MD5
bdab5a6b30ec99c1494b3ce92741e8ed
-
SHA1
5b4d1504b0ce8f2e13e182d49990a4e3cd4bdf31
-
SHA256
b56480372685a920cc65678faef87d91a8306a51cd685705f498b6974456ccf8
-
SHA512
da4f2e8d93af5d4a4cd0d5e6396935dc2f685104893e58ba9005dc0b2d9e50316c48ee318d7be568752bb018f99c6dea910abb4582356163a534d69a3a8c42be
-
SSDEEP
1536:ka+Zu70YIIEiPyccvrKgb1rC7yO12i5ERl9jSCZ1Lu1uGvM:d+2mR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 3992 msedge.exe 3992 msedge.exe 1688 identity_helper.exe 1688 identity_helper.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3488 3992 msedge.exe 84 PID 3992 wrote to memory of 3488 3992 msedge.exe 84 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 3636 3992 msedge.exe 85 PID 3992 wrote to memory of 2060 3992 msedge.exe 86 PID 3992 wrote to memory of 2060 3992 msedge.exe 86 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87 PID 3992 wrote to memory of 5056 3992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bdab5a6b30ec99c1494b3ce92741e8ed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94f546f8,0x7ffa94f54708,0x7ffa94f547182⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,17339406374330015393,4543457183038798250,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
6KB
MD5f9f31f6b253cad7b984c156f7c582645
SHA1ddcc95bd67a5d84052d9108cc8436277f0abadbd
SHA256606ced82e32927a9f903ca75d3cd866def8d97427f26463cdd02ce2b48587980
SHA51203c2ced40f6675d2dd9f5b29ce66b8e1c87977618b5a21e271f969af26b769babfc8911d2e114932754220a9d6445b68c673bb64cebfbeebebc33bf33d0202d6
-
Filesize
5KB
MD54147bf18c9c7f230776b09f2b578d502
SHA14b0ed45561600046705e39c63eb4010e49d22b75
SHA256a459b6757dcb05d6093ca2d14a2b835b99b90d71d78043c89d5a8eda3199d36a
SHA5120268e7331e33cb77070492f6587ac2371f67d5a318d32c19771fc87d442581760af4ed5c2ba991f5c67b05c5ba4f42f392829b3ffae2c3d854b9acb103ef625b
-
Filesize
6KB
MD5cf404b79d669a1c0a4a11aba9b3854ef
SHA19153884e3ba53e01bc9fe1b670a1aa02756a486c
SHA256d8ccf0aa0752781fba3bdd299d14db45b5c0290897df41de3700bb633cfc199a
SHA5122a6539c6f93a65ce725dd7069f781ea2d15a6252083e957e650fcbe48be9c5a407c2a45fda6889904b4bf18e78ec58e66bf28e77d540a9a6306f158ca01a1d13
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD530810f35bbf881afafc234f8f7058059
SHA177e9e81da205273c2e896ac9bc0eeff84f58849e
SHA2561d329ebd60fa04775f96d11c4f0d3ffe01430318372b24a85f964140a193fa4c
SHA51216dd7b0cabfa46ae5178f6059ce344d1a465c80b780da8d7cb721af5c5038b2a127e95599867662ebf263be01bd3d710a7f72ac699fffb7867308b59ddc18ccd