Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
c219c1f5ed34389e8204a5efcddd1bb4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c219c1f5ed34389e8204a5efcddd1bb4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c219c1f5ed34389e8204a5efcddd1bb4_JaffaCakes118.html
-
Size
194KB
-
MD5
c219c1f5ed34389e8204a5efcddd1bb4
-
SHA1
01b85bb6f50241951ff4f2d2452a4be4bda777ca
-
SHA256
cad05ca33a1e51fc47d4e3416679737fdf6d5bfeca41a4b25b7f0c7ec6f53004
-
SHA512
d30ef0eb13ff1d795d3a9b8b05d97c4ff79990b3f1248d5af907d9c58fba7a8ccb9a661614d597a8d724715abcbd46b6a669c7a0e14c1d7166f44a53f7e914d7
-
SSDEEP
3072:SEXXG9yyfkMY+BES09JXAnyrZalI+Ye47uM9f7UL:SGisMYod+X3oI+Ye4pf7UL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 4544 msedge.exe 4544 msedge.exe 2928 identity_helper.exe 2928 identity_helper.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 5088 4544 msedge.exe 84 PID 4544 wrote to memory of 5088 4544 msedge.exe 84 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 2668 4544 msedge.exe 85 PID 4544 wrote to memory of 1416 4544 msedge.exe 86 PID 4544 wrote to memory of 1416 4544 msedge.exe 86 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87 PID 4544 wrote to memory of 1208 4544 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c219c1f5ed34389e8204a5efcddd1bb4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffb70f746f8,0x7ffb70f74708,0x7ffb70f747182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1199683644482641879,6469562440077280928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5514c6f3672e55ab98764acc4c91988d6
SHA14516ec3d394067fb24983eff0302f198cef83095
SHA25600f31b92176352cccafbeb476789ceee977ad814731f3e4898e66fd2bc2d278a
SHA512a59386415d1b239a4300c142071b555bfb9fb6c9b3f5649941d20bc2341a90c53f9994c264f83fb7b99a92b29b7396bb95e01076f8796c35b0922d4eba06ea9f
-
Filesize
6KB
MD51dab5bfc5f80a26a7a062793f5a9bd2a
SHA1ae268a0b394ae536d5b458ee6d1cb334f5dc8692
SHA256086d65285793d9da031a9e504632c10f64df9ff6a4342e04b619d1360c38585f
SHA512c9adacf8fa1247bfc0086c34f9ea8180fd6d14d8eb595483c1724f08976170c8708e0d4b70b6e48ad9ee61111f0d6d87fab1600a5d633701b2510a0ada51af68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD506a76e2e6f16440f26ae5605dffee9a9
SHA1ee0fef323be9e98c6fbeef08c3a6db65125f9f53
SHA2563c32d892c0a224079c366ef9b275d99480f6ff0c3998b4f6be77dd8f8df7efe4
SHA512b9e896715bd0ec16e5d05b9837517d8741616cfa04fda8194de1e2e91aaa82d811a1712163f300ef38a5287542a78152b26e037dc081d81dbc6842dbd1d0aa13