Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
-
Size
3KB
-
MD5
c0131d1914fef424711f06a85d492804
-
SHA1
a2d5a6a5ed4e9b107b0ea45f31ac1ef4c1e5bca7
-
SHA256
6265862f09098c9c49b773401541888714b2f3682b35fafba845089750a2c7be
-
SHA512
57cc541317a9ce4571097f2e1d49120c5bc87bea40f2a9554490b5c5f53124f9a6578a74239882c726e2cdda5caea8546c521199ace6d3296d709425b3788517
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 216 msedge.exe 216 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3724 216 msedge.exe 85 PID 216 wrote to memory of 3724 216 msedge.exe 85 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 3912 216 msedge.exe 86 PID 216 wrote to memory of 1164 216 msedge.exe 87 PID 216 wrote to memory of 1164 216 msedge.exe 87 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88 PID 216 wrote to memory of 2844 216 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0131d1914fef424711f06a85d492804_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9657b46f8,0x7ff9657b4708,0x7ff9657b47182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9118716795866727753,3895018129432140068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD561f2b9a5b67ba9949fa06fd837a6bdf6
SHA1c63096ff1399520e6b87fe8335d3437937371a26
SHA2565aae58ad714844ea63e86eccac6f43aeb2458b3aacc09a3e47617842e62d5d06
SHA5125e9dd4a059058fac5c7b5a41d6ed496b16ebdaa2909277df37c659db5dd637bd26e797d001016ab020bac4df10859f694fcfbd94e797f1858df166a1bae0ef68
-
Filesize
6KB
MD563d107875c486062eb50e466e56fc51e
SHA123316ce515822579528735838b104a974f1fbe47
SHA25623cd3cd5a3de406714240880dcaa20584b91f91700b9255605167d7695f0ad88
SHA51297e864d6ad7ed12f9dee69af95d9f5c99a4e531e11083759ad38d6cd617ead05a67d629076369234695a8ec189d7619180ba09975bbb9aed0f93f069275699e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6795f2d3387d6dd84f33099a2427973
SHA168d4a7013823175e9af9e6c0a5680a2e97eda20c
SHA256159f484f23e21994293c329ad6dd90a32c7d2bc98f8745c48eb341d681711211
SHA512b55637d2b86ea12b79a0b6fcd8b49f3f205253c577ba4ba8c70ba3f3cc5d8d85865ddcc85664907d76249913eb1be9ce2e308cea824399e3880e54b852716fc4