Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
cfec07f4ea94e61920330e03e96fe169_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cfec07f4ea94e61920330e03e96fe169_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfec07f4ea94e61920330e03e96fe169_JaffaCakes118.html
-
Size
12KB
-
MD5
cfec07f4ea94e61920330e03e96fe169
-
SHA1
04f3ff351fff32ba54d52240e07c36bb42b443b6
-
SHA256
cd41eb1ec60d4f6d07b781f13ee592d6589713365c55d5b50e900312e53e5bd3
-
SHA512
8efd0bf54152ecfd738b6cbb3dbaa90b5a2b15f29b2bb8975bbf6778f63e8026e5dd125f5b6bd76fac0d7742b36c1cf0305f43e94ffedd9987168d7d1a1e1183
-
SSDEEP
192:1ugU0N+HoHurR1JSN2+fOIrUTFEvxxqk96KNdzliMlCf5l5aY32m:1u70N+HoHa0N2+fOIrUxexxqk96tB5f9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 1220 msedge.exe 1220 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 932 1220 msedge.exe 83 PID 1220 wrote to memory of 932 1220 msedge.exe 83 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 1344 1220 msedge.exe 84 PID 1220 wrote to memory of 2620 1220 msedge.exe 85 PID 1220 wrote to memory of 2620 1220 msedge.exe 85 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86 PID 1220 wrote to memory of 2312 1220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cfec07f4ea94e61920330e03e96fe169_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf89b46f8,0x7ffdf89b4708,0x7ffdf89b47182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18225583134856223700,17671522136584871335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
502B
MD5659f4969b10a55a0b3e951bd36a2159f
SHA14310b39a59bb0686ee4c0a2f3091a53f9d9900e8
SHA2566994b10536e0d967d8c61c21fffe775cb6b5a1a2273aa0887a457c82b872df28
SHA512be67e679b054e73640180c51fab5d1f2bea0557b61ab64e1748d49d56ba6b03437c5dbb468083f03df33162e137aa1bef48a3ca10c6689b9b1be5853e3adc563
-
Filesize
5KB
MD50a59da63d6d1ea2fdbcf5bc8fb7960c5
SHA1399a399b46d89ff7171d9be9bfe081a4cbc705a4
SHA256d7f55b9f93f966adcf85106f9def107b092d8f2346c5219b9f3f847eb12b1008
SHA5127fe9551ddf22b80e139f9621230add23eabd520520daaba9272eb6521cada5cae7840a355010b29c4ba609b4a2c2c1da80bd0c30b7e897a6d68f5822420d100e
-
Filesize
6KB
MD56810e9779eab5b173ba14483944730e5
SHA1d052e07bca7d07cd808cab848c79bd85bafa5cb5
SHA2561f3af33f7cdc6bae11a567cb95567a6b1b4f3a2a0894c3ac2cfa8d068b017165
SHA5128879e2460e086a016c1f0fdab9bd1c1ffa56d9d9b07819ab288bfe958026a212146af864dc6e1975ed817d5bfe3a854a5767db8fbe2d8d19f44f968bb4dccc70
-
Filesize
6KB
MD5df179931881a2ec1bd2b23c2fbb2ea4c
SHA183f09b5f2a9ee0fcb30ab60764a2905f198516e2
SHA256842d45be2920f5a7c891f0a1820f4a97e85ebb0515c1bc84a1682c51228560db
SHA512fcc355c00e6cc7db52fe2aa726d85572b73c89930c912e1d615ea2b18f77a86fb93c026084751e5d0ff679ff3ff88ab3e1c1a04536e4e74d21d8ef9bd934dd35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD549f6b678f376e402e8381c4b44f87e27
SHA1e8d8fbc57c8522925ad6570360921f01aca9204a
SHA25667538eab673cccf9ea9a89480db227f045a5e227d7655fa49d87c943375b10bf
SHA512a842a9c5290a0aced2c415ca07152a38c59f15fca85ff87f323cf9daddb0ce448420dd365e2414c39dfd53b0d2c7c7f1bc35e777fd58b91029028fd8b23a4a85