Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
bddc5f04aad68310e04f3e32122ed8ff_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bddc5f04aad68310e04f3e32122ed8ff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bddc5f04aad68310e04f3e32122ed8ff_JaffaCakes118.html
-
Size
44KB
-
MD5
bddc5f04aad68310e04f3e32122ed8ff
-
SHA1
cb7bf95fbe4082262a6e7af261c5220dbdf6e02d
-
SHA256
4eb6f39a8569759eb58e2b34129efa0641739ec2d476f8bf678d40291279b476
-
SHA512
ea32037b23b5f3d028de8ebb2ac1f4d4aec12df414170db82000823e05f8de2c0d05146081c28b595f899d67ff42da22d3a4d78df4762db72626883429c68181
-
SSDEEP
768:tncOWPOLOpsxHOT61DKpB3gGJ5Sm00sgsy6E5TED/kDat/Hnm/ud886awJwfB8Ov:tnTXKl4KpB3H5SD6Tk/nvSvQBzzQS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 840 msedge.exe 840 msedge.exe 2156 msedge.exe 2156 msedge.exe 1856 identity_helper.exe 1856 identity_helper.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1568 2156 msedge.exe 85 PID 2156 wrote to memory of 1568 2156 msedge.exe 85 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 336 2156 msedge.exe 86 PID 2156 wrote to memory of 840 2156 msedge.exe 87 PID 2156 wrote to memory of 840 2156 msedge.exe 87 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88 PID 2156 wrote to memory of 4032 2156 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bddc5f04aad68310e04f3e32122ed8ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b75546f8,0x7ff9b7554708,0x7ff9b75547182⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,12990612098229647020,1284044786435593237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0d9dff88-4cac-4515-bb92-823cb494f83c.tmp
Filesize6KB
MD5a407b42d818a91c98a8d5ac32255cef7
SHA124c1ea99e5e35b62d87339209eef187f0dcc380b
SHA2569d284de7dabcbb354a958c677e4b7450a22b744b1d0227872261e8145c04faf7
SHA5126e7496531b0e98efe49a0a7656bf45b405b2840899f05cb7e429d17174ecdc7bb580212a2cdb99403dafc25bbeeb6e756c202b60035872d4516b072e9c4628d0
-
Filesize
144B
MD525dc1279443ea958f5ac40ed05d1c20e
SHA135fd9f6bf0e0b3eaae0bb1b5b822628441755cda
SHA256497b693f1e049ff41225d03fd2fa6365e2c4f2d381b646a098834361eac33cf4
SHA5122a2a52c8058d021549413cbbce4b18c7307181ab043bb096023277914fa0418893f8c03e424cc50f5fcabffd322e429a68729802554b4b47ae624a964e483164
-
Filesize
1KB
MD5f28870179756afabb383cee11bcfc1fa
SHA125e01d09df9cbf1bf35f2c57faf416de60fa836b
SHA25620e6296184f78a249ec26d841a16a5c34f01a086021ddbdb1db10fcfedea8a67
SHA512249c4dbfa1f6d85d58a160f3380b03561c292943b08d263f63310db221aa257b0593a227f387c006b6fc549c1db160615f6847643eef49957f97dc8b1f413bd9
-
Filesize
5KB
MD5c6f9e68865609606524a16866f5437b4
SHA1bc72e99fa3ec1bd208a55a40549be8c55d1d8703
SHA25654dae85a26782ff67c30eb468e88bb1c5c3ce3ca6517c78a14ee0b4eaa8a04bf
SHA5129757919e5f87ccb5f0d70a1a8c038506a87cfc9db4d016c8e175349d3951622aa337b7d541aabe84ab88e7b3d2025f1a3e7b700ce462c3e3edba9ebee23b326a
-
Filesize
6KB
MD5279c7df064b2eb329b7e2fd3ca4b191a
SHA1acceabf592425606b83d89410e2bf7345820a67f
SHA25681bae073ac5ca1d33b9eb3faf6d06990f2886446b463e20acbebe14d8da869b5
SHA5124325cbcfa55126a32a3cc9eb7bff7cfd8530480c7a230062b0af05bbbf227568698cfada7c2f667a02f12d7a55c34249a1270eea4c452bbeaa824d539e7fe35d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD568bdd74a05e609be6bb135ff71f0f4c9
SHA183231e05f2274f3e72448093d0681b35865ed9b1
SHA256cbdd35bb46fe9be5116030cabc1af9c5b20a45595198b8af1273dca5b052db11
SHA51216c8ca7fe96423c2bfdcda5f7ffe9d4ab9f93ba45608ac2dfbe208bf28d357ae5301a964babd7ef0ee66f27c895bf8f5ee5fa3bb92f89add6c63b8c9943289bc