Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
c0021238027a711e74c430a650911308_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0021238027a711e74c430a650911308_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0021238027a711e74c430a650911308_JaffaCakes118.html
-
Size
27KB
-
MD5
c0021238027a711e74c430a650911308
-
SHA1
be46a24d19a7f0cf102271d2576783637a7387cf
-
SHA256
065bffc3686f248f7ae343237298e29bf3fea07b50f303adcec200e0d2ad845f
-
SHA512
1a6804616e343874cd918cf8c0829091264f7558137cc3f74a453ccb07c0a7985df0a17b5f8163171db70aeda05411436399cdb934bb417b5c7e9ec478b8c169
-
SSDEEP
192:9SnwmObsOy6aXucrxs1i3aNaxf4KuRwpPtljCNXNM5ZHZe6NXNM5QEeZNXNMAVec:9iwmObRy6v1WbPe6IofAjMmIDwbKb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 1136 msedge.exe 1136 msedge.exe 3844 identity_helper.exe 3844 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4756 1136 msedge.exe 84 PID 1136 wrote to memory of 4756 1136 msedge.exe 84 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 2956 1136 msedge.exe 85 PID 1136 wrote to memory of 3044 1136 msedge.exe 86 PID 1136 wrote to memory of 3044 1136 msedge.exe 86 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87 PID 1136 wrote to memory of 2464 1136 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0021238027a711e74c430a650911308_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd16d946f8,0x7ffd16d94708,0x7ffd16d947182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17568246993859214491,13183696284721987229,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5012247d27a8afa7c757f25b6ac23a213
SHA1c1c2156e20a34b01b79d0a39e20e7019427a99e1
SHA2567f9fcc811083dcc2bd09c480eade75f414b728304f261e815c73afca6057c729
SHA512af3b45c0488e28ec98c80998c3d868159ad36cdfb05eeb5ab9e393986dbc343ed0b40b47703ca2bfcae2db19438894165d39825c7e756970639e267f8b95de17
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD5b2bc2a96961c29216d7d51e88d6dc130
SHA1629f472b1763014b06549e130129d31937785e1e
SHA256a5be46ff7007c24b5e92587363d983bf14d107246d42ee47794acfe82a29ab04
SHA5122c54dc937347767edd734783a0e3b2ab920be9735850c6131ce7f1d6c256e0287a24151c078f42336814c65828254ceee4f6ccc8c523e8c27355ddbb3c9f01e6
-
Filesize
6KB
MD59087fbd78ddc93273af149cc75dbeec0
SHA1deaa8231a9f93f0cee73c9cdb25bf70540cd02a9
SHA2562b534d1904420b1b634e20c0e7d474de87ebf17903f55ad114252e2cbf312ebe
SHA51200879c1ebaeb0e1f7606afa64e167aa26570d791e54a7d631a4b95dd3a602c475944bf4d89da7c4f2aa92936690ddeb0285eb9a7dad6c145cdf5e45fb07719f9
-
Filesize
6KB
MD54bfb20f777c755d8a03a4f26f50b9f3b
SHA16756bef418a8492f4dd03197800c444c3abb091b
SHA256808cc9101ebbf378eed78aba4b160010ba42dc1083c8aca3b64e82bcba82e370
SHA512c17b0d8316706a244da5d9e3b48d27d3ea69c81e00eef46e304c1fdf672c6da861910d8712102b1bd3a57141af090c19575f2f7f440c04058e7af6fab1e868da
-
Filesize
372B
MD5c93c57dd53217e67133f030b45ef60f2
SHA1c202b554f37e8a656962ca3c80ef5d299803f352
SHA25678b108948b316ecf47763e396a8664bef1bbb1937128f4d5e7ac79041724e493
SHA5120efd8ca0599c6a042532a0ca45f3e71af8de1ac2fe280e69d5a167cfe724cdd4d9dabef6cc1e7c21239e502d280a4b4be8d1189f2aba251a141fe6085b7f8a20
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ce06eb1f-e0ee-4118-9f2f-dff999d3d648.tmp
Filesize372B
MD534b96a95446b139b237d12b5b9a036f5
SHA165ca15414bd26fec3bfa1b577f9ae17809fb5191
SHA2564603c34a64fd99cf1efe956c1cef2d0d8696bc75140e92047fd3f0d36e04e3f0
SHA512ef72af23196f2f8f4ff860fd2d2dc793e46044b0652dac6cad711a98580e6744fd3d3bc5987ebc9720f3062615678ab3b11dc3e0376ba465bf784322baed95b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389