Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
c948e32cb81c7705117a1fba2f187a13_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c948e32cb81c7705117a1fba2f187a13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c948e32cb81c7705117a1fba2f187a13_JaffaCakes118.html
-
Size
201KB
-
MD5
c948e32cb81c7705117a1fba2f187a13
-
SHA1
611c9f8b7dd66b398bb248343de9e44dd85b8c8b
-
SHA256
3b79c7ab3aa31c0eb43c1de9bd4da9f0cde2ebfeafd386022e40866d6ca00dc4
-
SHA512
e916495280fd5129acab1c0a3f689fc88d0d83030aaf37dcd33a8badad47317ece23fb50617071bbf41cff2239c9733eb364ba7a34e54ab77df6381e1d6a07da
-
SSDEEP
1536:kaydXEaBaA+2MYwLt3/zc61+OVZWVxp1VruWlqv+NGvM:dyYCGc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 2400 msedge.exe 2400 msedge.exe 1888 identity_helper.exe 1888 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4984 2400 msedge.exe 84 PID 2400 wrote to memory of 4984 2400 msedge.exe 84 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 2460 2400 msedge.exe 85 PID 2400 wrote to memory of 1912 2400 msedge.exe 86 PID 2400 wrote to memory of 1912 2400 msedge.exe 86 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87 PID 2400 wrote to memory of 4752 2400 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c948e32cb81c7705117a1fba2f187a13_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61a646f8,0x7ffb61a64708,0x7ffb61a647182⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,9561850589982860220,11486816913137653657,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD5e13311fe91dab98d6aa4af7683f51d67
SHA1f2cbdf9217f9fd0b36716a1c4c38f0b99f29c83a
SHA2569d4d029f4d3fa9c33c92e2a683bfd94c6b4f5fb7ff4773238527b00ce09b815d
SHA512a2988ab2501994d23d0fa9f2c8e4c8d98eab0ddc600a1374676a0f54014302215aa0aafc056b40d9f3d9ea7799ac02878848ec01420ec1199ae9b6e2e80b7d15
-
Filesize
6KB
MD5d6030433fa1edbb9b19727329015a7a4
SHA1659f69854e49c0cc23c562f8b52da9bc207ef998
SHA25623fe9273b6cdf53dafcf89a3822f700fda034a02910fccade0eb8a065dbedd7b
SHA5124b642c5ff7465f5a3af40492939acfcd644b0c7c552e257c74db1e04319d0eaa3298f6722fce679d2cfd8438e0efc775ee25853712d55bd278b58af54d9a8b9c
-
Filesize
6KB
MD547c11906781b2e202729aed9b0ea14b0
SHA1dd8507893ec5fba95c9084869d7badc9f47c7ce3
SHA25662a2b4c5b710b3e6fbb7998602f9c980680d5d38b23240dfeb000c70b68ce837
SHA512f0087d9e43e5cfdbac542effd1a582078de65600216f1a41a731bc72c787d42af1a6cf5a79c5b7d84bc6075572560004f5c4e5e0b49e2528e7794779f589df83
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5412d95b7971c8b5958e7e40838dc652b
SHA11da832cf62da05954bddcca569e1d81aae813416
SHA2564be3b5656a221fb695ab20249f2bdb934fe685572da8509c201e409ae5506131
SHA51216d676544cd70097152a45c71fb149c689f91e4e475b74ec8832f7851c17925e2e0a49782f09fccb93df48da74718a77095bf231d855150b9e83950b38875b57