Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
c833f4e6232a16000a02a00b42d1bedc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c833f4e6232a16000a02a00b42d1bedc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c833f4e6232a16000a02a00b42d1bedc_JaffaCakes118.html
-
Size
30KB
-
MD5
c833f4e6232a16000a02a00b42d1bedc
-
SHA1
55b1eb2e502ade03329a9606684fe62a3408de87
-
SHA256
61e67e6854d5738908ff2a03de52d2a67b84c697cb29e0c0202d07b38ec66cca
-
SHA512
4f951abb00cb67ce29bca1473323835b1110294283c6b8e5b111fb1a392b9516b76b17d54cfc188b8666d58f3823a7422b167e548e40bc8fd7fb6d61e68c6cf3
-
SSDEEP
192:uW3nb5njAZvnQjxn5Q/znQieKNnInQOkEnt11nQTbntnQOXC9AJ9EJkcwqHA7Jvn:rQ/jgfQJua
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 4800 msedge.exe 4800 msedge.exe 1584 identity_helper.exe 1584 identity_helper.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 964 4800 msedge.exe 84 PID 4800 wrote to memory of 964 4800 msedge.exe 84 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 4832 4800 msedge.exe 85 PID 4800 wrote to memory of 1048 4800 msedge.exe 86 PID 4800 wrote to memory of 1048 4800 msedge.exe 86 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87 PID 4800 wrote to memory of 3216 4800 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c833f4e6232a16000a02a00b42d1bedc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9addf46f8,0x7ff9addf4708,0x7ff9addf47182⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4087404981674579174,6276379238013310303,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5c9b48e94f9b416c928d602d60add00ed
SHA1828deed33a7a4b099a34a52b6fd0c5b0d42c75f7
SHA2567fc0fcebfd3fa60a0bbff8e41cbb6a09b11fd786c310c16b4cc019d4a1a55e83
SHA512a79ceddead6b4bda671af30f7277c94ceabc76958718a74fa2bf08509805e8dd79112466fddcfab0062d41644766503a98afe3d8056e99c3ed723d64a8985a79
-
Filesize
6KB
MD585e7e457a61a74ec60eacd284ecccc37
SHA1de060af54a1b3b3577b96d04fa1774a94f032ba8
SHA256a3368f0f27b4264cbd2fda7fa5572203744ecfe567aa6b79a30726fbdc2612f1
SHA5125a31d1d3b0885742445095e1ce5fdf64e185358d7fbaa1cdbf32e03eb5b5f08a94b09c258c17305f01bf6d80c479d08abf6bcee0ce641f99d75087d03c75644d
-
Filesize
6KB
MD55388a4c7a77cc1f5eb7973982a59dc9c
SHA1bdff949eae891b0c0a0d37be778b65b6e34dbcf2
SHA2567c064c9122cf12e8ef5f7c905552fcf9a56ee4fed62f8773667890f9d1851916
SHA512964b4723d307991f1dff3c53c8267c1771342080f17fb0ab30559bc89cae925d710b0672d8a2131d79be03f77f876dccbddb375c2e52206b88adb28beae1437c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD511b26631689c50912bc01deefcf6931e
SHA1bdf590d6a968bc0a3af2d801d0b88a23853c5172
SHA25628cc630df4ab3d1b1982b7d290cebb9b9d3cc9e0497246b5cef23e0f0d9572f3
SHA512f9b36627c59fbbcfe2229f4db143beb6539bb4f482db3067d415e550b8200477b9f5173bcde4f9a8b2942c9da85881a7b152383a2ca3ca3d495de39f0c8550f1