Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
c1aeb31f83f80f54a122fcdf1db4b954_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1aeb31f83f80f54a122fcdf1db4b954_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1aeb31f83f80f54a122fcdf1db4b954_JaffaCakes118.html
-
Size
107KB
-
MD5
c1aeb31f83f80f54a122fcdf1db4b954
-
SHA1
42f7899c293ad931c3414f0ce4748ec8ba178e7d
-
SHA256
6204d4937abf6dd95bca1dbd7b17164e78528a5b8916dcd7cad1e03ff63fd50a
-
SHA512
e871b759e755b52c334469acb0c4bc3a99b40883c48f9fb61fbd38d9901c18c40ff085c13e70aceda429b2a7a7408f82278169e02eaaea4270708d8dd827ac4f
-
SSDEEP
1536:ZO5X7lJIb0CHIIRZJ54uaYhKf3eCuaZ8VeVUDDkIti2I9bVeVUDDk8GQL04VeVUH:ZAXhCTyunAujI9b0i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 2784 msedge.exe 2784 msedge.exe 1548 identity_helper.exe 1548 identity_helper.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3192 2784 msedge.exe 87 PID 2784 wrote to memory of 3192 2784 msedge.exe 87 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 1648 2784 msedge.exe 89 PID 2784 wrote to memory of 1648 2784 msedge.exe 89 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90 PID 2784 wrote to memory of 4280 2784 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c1aeb31f83f80f54a122fcdf1db4b954_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0xe4,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13867084288833666207,7127831969913093679,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
579B
MD5b7563e291113b13aab2a9c23153dd9af
SHA190246049b3a1b77e0b7ff0310f4fdd66e86b0fe8
SHA256f0223685bfc337891d12bbb575cd4d40556b38df53ed6d74403d297d5b18416e
SHA5121c8084aff940dd0152c2792973d9f3757b012f8ae2021e5cb52779ff7bfe28390c55d566bb7ad985569563d6e85cc27c57062750f344223535ac08ca6da0d7b3
-
Filesize
6KB
MD5ccab78009f883c288d606469476e19ee
SHA179e29cad5b5d22d0c78473cab31c753d45f03c25
SHA256b4b93e25bf5e4c94fcfb11d99fd78127a28fa5b2bb9a58581c19c6aa9d187223
SHA512e3d6de9aade14983aebf2d1e7a05e0b1242b4c7a8496120466965c851a33f6210fa1aa93859ab0ec7d902ac279eeaf48835f0e8b9a25d9b53b529d8ce49982db
-
Filesize
6KB
MD5f3a3feeef3b2209b6ec9df0430d90931
SHA181b1abb6cb90e28ce30edcea4da2e692d000c871
SHA256af6aa228f8e752fe9ee674bc5bd151a6f7310689ddda7f24273d056ae71af0fa
SHA5126a8edd15e46714f870dfb29d09a675c8301a0740e8145cc4b128bf82c386d8d3be96b16b2364555d55005bdb3f1235483c0dd7334052701334dc8ddef2b82dd1
-
Filesize
6KB
MD559b2174cdd436f70c0a33b38ed4456ca
SHA1202ac5e43ff0f1d2fb1971f4e04c5abdbed2a2e4
SHA2563344655f9b6f0d6f37b8786bac9dbca97f9ad542f3024171c0b902044d92d4de
SHA512ef2f7edd40f41dadae2f7e5ce711fcf900a6ab135a80a6de751cf3df5ba23030f954e003110a381216b3561d2beaccea51e7438ffc3a7e1608dd7b8dfb28e3ec
-
Filesize
6KB
MD550875b0cc950132ec3f9ab38249da2f4
SHA1908f5a1d2ef0f67c2fb798aa9c8e5b09f6b42efd
SHA25620bafa5da386802ba18f1fa6a723c9b766a7c05f27c9695f0d11c967ebc92395
SHA5125b8d3ee5f9febd0dbef1e7539dba6e40e9ab867cc25f5cd21318ec7367dd61622f49eedc7ca41fd70f6e4c9f50a0716f1f56c889a68e4f339c7802ac2ebeb8d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53118d201dfc2c0157c051ca669f7c638
SHA13b3fefdea8bdf4540536bb257cca29dd73f0d757
SHA256705295b1f699c444ebeee287879e7fef7f90a933795670e45665eba12642fa20
SHA5128c8aa815658048fc9df16657fdaa24b273cc66246d264eab0ee98e19ab252ee5a112af507dc91c634ceb84617c450d80f67c71fbeae88e56ac1bd5ac79f83131