Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
c006185a4f9ec6fd0819f9a6de1a1b93_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c006185a4f9ec6fd0819f9a6de1a1b93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c006185a4f9ec6fd0819f9a6de1a1b93_JaffaCakes118.html
-
Size
51KB
-
MD5
c006185a4f9ec6fd0819f9a6de1a1b93
-
SHA1
6dc01e06011fccdfdd84cbd0112068836eb0365f
-
SHA256
44765be8780c7a1a1f1cd374dbb5a5eee53887e7b5644112c5dc0d2ed717930c
-
SHA512
52ec167d218db9eccb0a680a4db29962c47df665c2986a2f882be33275f19e97ba1d485e63d645d9c314948a5a85c05ba2db82e15e6065db2111d85929d0545b
-
SSDEEP
1536:oDkzTdd9DgXVODDYPHeoAvmeb5e5eeQHi59/jEwJc6L+nBT7A:oDk/KuMaFH8jEwJc6L+nB7A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{51626846-91E2-4040-BB0E-7816D99D923B} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 516 msedge.exe 516 msedge.exe 3320 msedge.exe 3320 msedge.exe 4364 msedge.exe 4364 msedge.exe 3540 identity_helper.exe 3540 identity_helper.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 5072 3320 msedge.exe 84 PID 3320 wrote to memory of 5072 3320 msedge.exe 84 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 4936 3320 msedge.exe 85 PID 3320 wrote to memory of 516 3320 msedge.exe 86 PID 3320 wrote to memory of 516 3320 msedge.exe 86 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87 PID 3320 wrote to memory of 396 3320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c006185a4f9ec6fd0819f9a6de1a1b93_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34846f8,0x7ffcb3484708,0x7ffcb34847182⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5000 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,3258799427583917884,9401197815661626304,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
396B
MD598a2d9cd0979a97d021732b280b4243b
SHA1330df9931a3ea72cd54f0e69a10a05c0fbaf4fa1
SHA256a2ea6f05ad82d421e69d3d81a3a104344adb7bcb8deb374d5c812325d0480709
SHA5121353f7ad3879b5595144fe31c964394cff770eae87557e4ceb27c1e953dc66944bb31c0f137fb52f80a26da98253209372d7abd2a58c22b34faab97de5a02254
-
Filesize
5KB
MD5f930de28150e90cc35fb39899e0bd640
SHA11689ce877d00ee0c5042740353685b18f00f5682
SHA25654ef607083061d013059f067ddec2a8bc768c9a2f4a7ef703711ef36a3568d76
SHA5126a2e06a50c918cf7787ad15354a1f4f23cf82fbb913a35c85a34c40e4138af08ad22c6cfc7ebf6a22160091e368a9a8bea6fdea25c38f515031d7d00c112dacc
-
Filesize
6KB
MD5b10ba912d094568f4d317298ae1ff6cb
SHA13b0a745ae8ae0a66199190de5f24add3bcc2f6fa
SHA2562f629dae6cb643a8824f88dd9bafaad53fe03ac337d3f563fac356e527d91ac9
SHA5121acae3fda66d1a2488ea8101d55ca0b06638b76685332231d583504ac5cda4d197bd051207cadde884be634567f7cbb83f4c08c933db6d8fa9bfcb9da6d007ea
-
Filesize
539B
MD5fdc5617cb4eb24495bd6c1964fe7db65
SHA159c4cad58db2d27de3a07cce616b11c51cbe3de9
SHA256a2dfa0e312a1b712c5cf93e748f531d4359ec304d3fdfa1a85d2e6dc5ef315fa
SHA51239b78c10d54d6ec64c41648c962e4d541c9e601364516ee8a1bb22b27da967fced76aaa6bff9c27ea3ac68767ed263a16ceb345a203d9515c6b484994311432c
-
Filesize
539B
MD5bd0c50bd5283f11abb3f0c1e5e346939
SHA122ea4c302a50dcd147474b91a15b3f8c26829801
SHA256ea1cbc06edc10a47dac1d820a79bba4a97ad2feff87c20e7faf8dbc39ef0f8e7
SHA5123a05ce529c12638a7f4e6a40b25b6ff1f3ffa85e241eaf9d225ebe0d19dc990661456dd2f3d5b8264db4bf3c2a74382029f66a774347cf80f01de874134d549d
-
Filesize
539B
MD59287931fa30e04bf858761dfdef4b774
SHA10773217c8f42aa93a509017d4a392a877b999caf
SHA2566e495bcf799b2002a5c941ae96cf035f4de1e04428026a834dde68b81d0a3ae9
SHA5129242470b0c5d2ec937fefc9acd4a23eb4dca470ba02317146738407d0dbafee2a3b2d3c83dff75f846d349bf5f209eeb8d25dc9a12f0be25c86439d091c263d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d580910a9384135e2c3a590e994a401a
SHA1031197db9c8a5131c09782f90270abaa159b5bc4
SHA256fdc0dd78e626b35acc70f69ed3d6dd211b53d7b769d9d0ca523004c5e943ad64
SHA512e1344ca4fe4cb4209db3cd9f1767e3a7fa88af4036f6c68ae4653aec79da40af34d1a93d416129312f881e7a0d06722514b3a83e688a82089050fe9fa78b4e3c