Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
-
Size
94KB
-
MD5
c21331ecfbcf8640a9364b9cb034cd56
-
SHA1
7fd845d8870b7521757a760eec0fa144e9aa8b74
-
SHA256
959c4c0908253107e6ad5608d8803b8fbe345f9476725573380872a588043d72
-
SHA512
1b60b6492e34d52cb6c1afd905fb837c5210bd3c2a77d54a3e9c7312edcf5966c354c8b6d70866bb686f4c6bb054e083b46600a84168f1d8eb1558fe7316b4f8
-
SSDEEP
1536:WMLiNVc8+GLTEMXFLU7LT61rDeez4tPKRjyLZfZBdkrY8mgHC+qpEyW:WAigysBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 1300 msedge.exe 1300 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4112 1300 msedge.exe 85 PID 1300 wrote to memory of 4112 1300 msedge.exe 85 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 1988 1300 msedge.exe 86 PID 1300 wrote to memory of 4988 1300 msedge.exe 87 PID 1300 wrote to memory of 4988 1300 msedge.exe 87 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88 PID 1300 wrote to memory of 5008 1300 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9feca46f8,0x7ff9feca4708,0x7ff9feca47182⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2746083856470349257,11277865973492561707,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7b8df88e-7ee5-4719-a263-528e9246197b.tmp
Filesize5KB
MD59b5cbd817ea9ccf96d1df97c2047bf00
SHA15e83ab2e6b019f4053c515707ad24c17ce88ad47
SHA25697f104e9a2ed890f89f45e77bfdb12721ec37ef2cc0aece9050da89d6b021b47
SHA512331898099ef3a07840c5ae11e3c5cda6ee535d194a7651a0299ce8823f537fd03a6970ae020514d5418a779832d82a8fc3daf5fd74817c0b74047489ee4089fd
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
6KB
MD5616986989f3ae603b85ef453b4d83d3f
SHA1c16d0c60f067f015e6c8434303247aae64815c02
SHA2566a316ec46770302d136aeb74345f0dbd52af3f1197e76a348e827476b0724312
SHA512c4e15ded16fd90bdaa538aeac7a9785bcc90abc0d6d62f3090fe25809fd274b8b28a5f6f1227f86d550873cda4905a02d6926735159b3a9238165e13f38edf06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d389e59b8935fcee10fbacc8cea17a34
SHA14be2cbbfc10a3d02dec3e4584ce7164680155948
SHA2569a936c229820b1a028911d1fa6843909b51b01bb8dff6237799ad2db815a5599
SHA512571179c37f8a877f79750f5ac74d1fe0621b0205ca4b5ca834bfde9077859d030eed85c64fa55f9ea5549df23923486b4b7f93b454932befd5d33cc30437f8b3