Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
-
Size
128KB
-
MD5
cfb7d6e7b05c766b154af20b41979b33
-
SHA1
8e7cd2b15de69a7a75609a865dc569b636456029
-
SHA256
23b21add3511d03e4b43abfd96b7660a745232665b8318df7c4a21133ffc3e21
-
SHA512
242d09bfd72a39af6296ecf45e9f2eff125769dfeffcf0952fe0175228f797013d164936e7f0aadd3b79c7b322de9f0d7d9855c4ff8e387b2e87c8af078890f8
-
SSDEEP
1536:SHE1QQfwhUIjq+JQ6q0VyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SsfEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 2300 msedge.exe 2300 msedge.exe 2064 identity_helper.exe 2064 identity_helper.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 820 2300 msedge.exe 82 PID 2300 wrote to memory of 820 2300 msedge.exe 82 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4692 2300 msedge.exe 83 PID 2300 wrote to memory of 4820 2300 msedge.exe 84 PID 2300 wrote to memory of 4820 2300 msedge.exe 84 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85 PID 2300 wrote to memory of 2216 2300 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa0d7746f8,0x7ffa0d774708,0x7ffa0d7747182⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11683373363502892500,6347406674922028721,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5a4a0872a9f6b89ddbada8081a795ebc4
SHA1e4eaaf62b8f2eee7ae5ebd4476646cd9aede2fe3
SHA2565d15220a54fdb766b0f22699a8cd2c182ddbad033fd5ce6aa444478c523cabb6
SHA512c9c49fc23ae20f503d0d6b61e91cdbccc936c27cdce61a26c2b2460f62750982a3d3082cd6172b2acfbbbe469f046cb46ef0737f8ab637de160f893fd4c5712b
-
Filesize
6KB
MD5014c7d30a3587675b40e69a82a765a90
SHA1f3aef286cd40ca0acc1ae6414dfa8f9bd405ee88
SHA2560881eee694fac8dd10592a42863badca194e5f720c6c649ec9c388d9d6035552
SHA51232749bfc764c440f3794c49bfbce1897b0c1674c0eec2cccf95b7ebe67f061f7f4c8954523314046a7a6cf0b5f62585e1b6c478c7f82c3d73ceea056e8dbfc94
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cbea2ee9d033cbd405412971ae8bf6cf
SHA134b02f4ea5c1fea6e82790f8a812a41b88c402d4
SHA256919f680f1ef0bdcb2706b976178361c5e927632d8a2d8c513fd39923191df33a
SHA512d79bb3ae6099467f05687c7760fa6aedcccdac492b00223eae71e007461c65312c9fd5288589094ff78fedc70fcee8ae6a80c14bea38e14d9667fe38298b08d5