Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
c8f77ec00d252ba1c70afcd8f94a30ac_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8f77ec00d252ba1c70afcd8f94a30ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8f77ec00d252ba1c70afcd8f94a30ac_JaffaCakes118.html
-
Size
3KB
-
MD5
c8f77ec00d252ba1c70afcd8f94a30ac
-
SHA1
36d501566cf5dcd302028d76ecd41fa77bf9c64e
-
SHA256
2aae4aef1e78b24c09edeab12d44027983ac100bd42f262fef785c75bb5a6759
-
SHA512
0ae107bcccbfbba62dd5cf3209a30b29c20eb2330d18524899c9901b93b7d52e8443b1c5667a6771709aae733047d43bfe7e6cf1797f13c76a1c906cb6d27be5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3576 msedge.exe 3576 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 64 3576 msedge.exe 84 PID 3576 wrote to memory of 64 3576 msedge.exe 84 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4660 3576 msedge.exe 85 PID 3576 wrote to memory of 4940 3576 msedge.exe 86 PID 3576 wrote to memory of 4940 3576 msedge.exe 86 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87 PID 3576 wrote to memory of 1496 3576 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8f77ec00d252ba1c70afcd8f94a30ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,18138907644245226773,8062697142412706973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD587d539c327e763d4401f00adaa94c738
SHA1f52c58e9457ee90487b129bee6a3440c75e0c40c
SHA256eab17786ac9b35476947c61d75d8ebe74da9f434bc63301a334eccdd266ebfa1
SHA512f32c746af1eb37091d79d92f4e9eabd10cb87f6e0c1a8801522101084406e3b5db51e451620c0e49e5ffa821929cc87dd68739b913b2b53db9c828285e740859
-
Filesize
6KB
MD52868f11190700567a6bb7b311bfe954e
SHA1a042ec4f84e5e17f4171d640d9a91c87f65a5ae2
SHA256324c70be543827ee9e0906155e9936470167d8ada21373fcc46bbe5bd2c469b6
SHA512ed4799b2d3f845bf55b6e974a95a7f9c3efbde64e693a7fe8fbb311ec1081afe0614ddf003a120ef3657b182d0b720e5329eb788b4e67a910b105bd19ad20928
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD513768255a74a9cc8476f02a5b6192a70
SHA12c9ef8d0bbd37ec7c91f280aa43ef31e41b40814
SHA2565da0390bb17da53a2cc52ad4932c0a770f3536468ca2fd0d89fce9fce3522727
SHA512c60469fc57a84953b0382ac0eb1f53570881438882d22ac36a10148e225905bbd6df53a7e848bfe7ac85ed7df2ce365ebc548567623cc5d2b2020790c4d20365