Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
be844278ee4bffa6b3beade6c9df13e8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be844278ee4bffa6b3beade6c9df13e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be844278ee4bffa6b3beade6c9df13e8_JaffaCakes118.html
-
Size
35KB
-
MD5
be844278ee4bffa6b3beade6c9df13e8
-
SHA1
8f6384e2a9024dcbbf44a7bffbe163739b2c3205
-
SHA256
dc00062a644d99a22c5a4cf5da54703ee1d85440ad627306bd34dea9f268dc93
-
SHA512
174b39b0b75a3334e32fe3bd61ba9a570ab33cd42f19f7ca5f353373d289c1b24f9c5bcc1963c15b92795b43987c18190845b01d55e2f24429491a9174894fd8
-
SSDEEP
768:zwx/MDTHK888hAR4ZPX/E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLRH:Q/fbJxNVNu0Sx/P8MK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3596 msedge.exe 3596 msedge.exe 5104 identity_helper.exe 5104 identity_helper.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3888 3596 msedge.exe 84 PID 3596 wrote to memory of 3888 3596 msedge.exe 84 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 2632 3596 msedge.exe 85 PID 3596 wrote to memory of 3992 3596 msedge.exe 86 PID 3596 wrote to memory of 3992 3596 msedge.exe 86 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87 PID 3596 wrote to memory of 4176 3596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be844278ee4bffa6b3beade6c9df13e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfff146f8,0x7ffcfff14708,0x7ffcfff147182⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9066155409950388195,16358114102224814804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
614B
MD566381a90f27e683d2abb339c8ef4498d
SHA1aaad9e6304e75e27a49ecef22452ae759b40567c
SHA25627f8a4885b51dda8c828c803dbcb75a100f65ade0ad8d9246b4692ee15c694a2
SHA512041ac3548aac37b614e757516f930cfdfb26d9a26835eab55fee8e7c13b98438304865c7ee2455353b7a36d0addcc820bb7a587343cce51379bdbc126b35d330
-
Filesize
5KB
MD5a013a5a625b73da18c530e70c7ae885c
SHA114a1227c8c3e82a6e98569bc183132c90463dec6
SHA2561bc5f6b1f33d483eeef92678f51fc2be603785fe8b999e044a1d195475de2c2f
SHA512de6f1aaa26ff14e2c1f691261d1de781504ff32cee3c69513dbfd5316b98d7541f5fa84c274ea131a343bea385e157d39fa1223ee321d0a5a83b024bcedf2de4
-
Filesize
6KB
MD5ceda7950267eb9822ff8e1f46954d450
SHA19988cb704566d3d91b3876eb106cc7a2e2daf24c
SHA256ed02d720f41971c2fd5467b5886fdbcfa6a26ed7edc5229c02f1d199a21695ec
SHA512ea5b1dbb88f3b23c8cf79cfbe8498316d57dbb842a578d571d8e1cb78e54d0a51cac0f3cd31445af563013df2fecfb892cd3009b10df7ef2662e27de067fb9f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5771b55790f0f1e02221fa0e424dde8b7
SHA1519f651feeb75453760812da381471d4d6fdd44f
SHA2568f688750c0baabc35e82b0ec7c165c86057afb6390a389753fb78c470aef10c1
SHA512cdefc3e6252c212ff8e347251b0c382b24a0342d429d630cb37bb8ceefa2f19ac4879aa907cb8d4b88041ac7aa41e6552b19f622ff0c1e8032da397c00bb5469