Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
c8ffe9a742a19044c8c48c0a6a5a06fb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8ffe9a742a19044c8c48c0a6a5a06fb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8ffe9a742a19044c8c48c0a6a5a06fb_JaffaCakes118.html
-
Size
50KB
-
MD5
c8ffe9a742a19044c8c48c0a6a5a06fb
-
SHA1
e15134f1d1047090e2a6854fc866ccff0e3a84ec
-
SHA256
f8868589a754658bf6b29b3cbbb7743e11ce1417fe0eff0f51c639fea631561d
-
SHA512
f1a89b041b1a25ce2e7f8112447add368a0337d21b5f956f86fa8b543a3b93c3b72e46482368c29631eabee638ab8f93f928bf9d0ed76a4bcaeee40c785a8ccb
-
SSDEEP
768:bVh662pDmKMfVv9JO0IUX8HMgGU2Y6VYfH+8G/GmBn84Hp3m2SiBVMK:+ZrHMgGnY6VXjBn84Hp39B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3900 msedge.exe 3900 msedge.exe 1820 identity_helper.exe 1820 identity_helper.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 656 3900 msedge.exe 84 PID 3900 wrote to memory of 656 3900 msedge.exe 84 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 1016 3900 msedge.exe 85 PID 3900 wrote to memory of 3920 3900 msedge.exe 86 PID 3900 wrote to memory of 3920 3900 msedge.exe 86 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87 PID 3900 wrote to memory of 2364 3900 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8ffe9a742a19044c8c48c0a6a5a06fb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee3946f8,0x7fffee394708,0x7fffee3947182⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,5005908054690883933,3013423916773490628,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD543af58ba1e1bab69097866cfb8e3f792
SHA1d2ca7ee538f3debdf061b9af1b15c302faed4a79
SHA2566c871ea241673f980ba1bd5d5658ee61c93ab3bd4c409ebe00dc0bedfae7041a
SHA512ee20b3d6c3d465a31b35a18e14946a43e35782954f0d8d73d2ceccca18756dc7defc0dd38305fa54894f50dbc4baa5b106a1894ce4d8cecbacfd926c1ef5a088
-
Filesize
1KB
MD5bc7213f1a2ab2fc8187e879884a9cd96
SHA197856429b2cc1de0e0ece0c1824a8bb110ded780
SHA256db759bc54ecbd7a59bbc220631edefcfe6f61f88b433f2d75ffa7f39cdb499ac
SHA5122231247076b07cf3768bb2dc28829fcdfd2ee3ecfed33ba4527effe32cf0524dca65401e4bf22d3f6435337ba5d17b454cdc25879842de85babe248c0f3bbb97
-
Filesize
6KB
MD517bda89ed9ae780cda9be4c34eeadf2c
SHA15926afd7ca1e1da2026ed243b35f638707fdb0a2
SHA2561cce562c828971cdf3d2ac4ca7176105f38a8f069875bcf42357747fbf4789bb
SHA512fb2fa1d68538337de5919979a26d57690c070aa7567cbb61ad520fa512c6deeb9f480b8e0c73771efb1b84043aab76b228b8adc419f0b6d52531af0cd882b3d9
-
Filesize
5KB
MD5e849661abb8f55639c069a41e74ed9df
SHA14403ef1be71055d9b331479d61031473d97cd389
SHA2569e7b8ed2857dec3c595e5d64521a60de40f06bab55fc84cf093d39fae221b815
SHA512d2b9ad71a65330a930d87e30db00cfa7fc16a40d584d8c747069b1aef187b980e5103ef006f7512b0f121841dadbe20b7f7bc19b80c07d7120d82a1b8e431192
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53f875448e22ef9e21acb26d1393e877e
SHA1063cac61389920405130009b7f022b5a9075a513
SHA256c9122a5ee0a1af32029dea1d4efd5c28074f83f669501bf2c109ce01274ee67b
SHA5121380cc40957c0d87a739caff47585ad05d01c755787bbf64d1e44a9f154c0d6ff67dc4bb9927f7f5160159916552e1c2cb6e4615153f42856a7d66530032a332