Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
c7b3f72dd22fa7c36f8ad18794ed3946_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c7b3f72dd22fa7c36f8ad18794ed3946_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7b3f72dd22fa7c36f8ad18794ed3946_JaffaCakes118.html
-
Size
26KB
-
MD5
c7b3f72dd22fa7c36f8ad18794ed3946
-
SHA1
61820a735485d4d9924a9ecee4e8b013d1787eb5
-
SHA256
e2ed49aefa3b165cd69aff66d7b3f4531d3c5ab8bc4427bf27048412c1e283b4
-
SHA512
f2f01c2ffe2e101af9e46ab64f48513a4c000e6e0124de579bf50bbae6c74e29585310d24d38d722843ccb7fba68818d52b0d30268fa1391219d8a05a3248fcb
-
SSDEEP
384:Zd1h9TeZoAgHNY23YVwMhEpspk340t6tOXMXn1x2hKqwtO6oSOqwv9EHE08caK27:Zd1h9CX/440tB9EHg1XmABNRp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 4252 msedge.exe 4252 msedge.exe 2964 identity_helper.exe 2964 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 2400 4252 msedge.exe 84 PID 4252 wrote to memory of 2400 4252 msedge.exe 84 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 4088 4252 msedge.exe 85 PID 4252 wrote to memory of 2724 4252 msedge.exe 86 PID 4252 wrote to memory of 2724 4252 msedge.exe 86 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87 PID 4252 wrote to memory of 1684 4252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7b3f72dd22fa7c36f8ad18794ed3946_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d48d46f8,0x7ff9d48d4708,0x7ff9d48d47182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15638053270191726035,1064454855871039256,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
192B
MD57d2ae5ce97feb8ef80005534a82e6015
SHA1e5c0f1868c065ebc11f3f1cc6dc6e0d546c9fb04
SHA256ce9b034cc77d283bfdfde25389fa2e25190fcd9c87dc0bf497a015850e09e83d
SHA512f7c038d62f2af19a248a7739118d03d16d6936dea4f7c6be4cbe87eaa2504b55f6bdb4aabf98e344ae8bf4d2e69805b25ebe942990ed8b708a44345143a5015d
-
Filesize
5KB
MD5fe01db44e366a51434059b665236fd1b
SHA1c25656715fef22f2e822ed97517142c28bbd2e41
SHA25642a86eb58afed88e49425492f89607b209265c9c6c5ff13a7ad3f4b104ec10e6
SHA51299d337a2c01ca52fa430cefc8eb48d34005140937656efbe73662170ec78bd199ea584e7910cff817882161d25882bbfc2a813b61f808c10f5bee0ac9049b9b3
-
Filesize
6KB
MD5f68cf99401266845e14c735cfc2d8379
SHA1f5dc635337969eaf1a866880d3b6ae80d20a3c78
SHA2563eb35e8d74538ea4e4dfd8ccdc3259e44599c6657a0783d4c11ad262d00ec41d
SHA512b48ef09b361bc696633de03b3284575bb458e5d45e253410075872fb59a41b6b6a7efb2fa0189e584e5fbbc83d6a74031cb792314bade6c866fae95645e5b0bd
-
Filesize
6KB
MD55eb19f259df7cff8a0a76fac61220041
SHA19e7953ccc2954076829be6ff64b31d3423b9f376
SHA2566d6f02e724766073f603a0aa2efde6dd768361b50d269394e718abe20e44522a
SHA51263b6f0943363e37af60e7ec417d8ac9c98ac1f0821f630424d8f4a19560787bc35a66a192d2607e87d8a0f3682a11ff0dd6e1e2849831b0fcf9f9e6215f65c86
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ef204840022ed8b1a04f4b34e6ad7c71
SHA120614f9ef8b4f34a39052ab496555b71804c08c4
SHA256017fe2ba10c4d9d60940a221e5a81024ab556a9b235225846732bd8c83e64a1a
SHA512f0d179a3ede9266e3da2a41aada148af4604249aa8829a850a767d78599e1783e9fac9af2eb74365dd3aeca7d364fd86beedbb73f84e9c6cb8cd1503feef5568