Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
d1eb8295ed3ecdac4a530c90efb615bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1eb8295ed3ecdac4a530c90efb615bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1eb8295ed3ecdac4a530c90efb615bc_JaffaCakes118.html
-
Size
114KB
-
MD5
d1eb8295ed3ecdac4a530c90efb615bc
-
SHA1
e3a40024127c329f35719f6c78045a6a934b519b
-
SHA256
533b67922fcbe3cc621362b4050aa16eede37563d8c14b63f78400e2fb4d706a
-
SHA512
a04a3dfee7972861cd45d3c3df8c6385d556691b250c3fca58e3e686f6cfcd794c3d69eeaddda4dfe919a256a1841197567ae42fa709e218c53486e06a133e70
-
SSDEEP
3072:LQ16tacofkcRkcEff0fb/wG1BWTOQtzeT/B7pRhR8iU+sOOkXz/:LQ16tacofkcRkcEM5bRhR8u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 4216 msedge.exe 4216 msedge.exe 3744 identity_helper.exe 3744 identity_helper.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 5084 4216 msedge.exe 83 PID 4216 wrote to memory of 5084 4216 msedge.exe 83 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 4564 4216 msedge.exe 84 PID 4216 wrote to memory of 3272 4216 msedge.exe 85 PID 4216 wrote to memory of 3272 4216 msedge.exe 85 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86 PID 4216 wrote to memory of 3120 4216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1eb8295ed3ecdac4a530c90efb615bc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ab646f8,0x7ffd3ab64708,0x7ffd3ab647182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,74242630005940365,3767589704388533951,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
1KB
MD56ab972f0eecb550644341fed1d0204e1
SHA1962042788c682135b0619087cbc880f4714a1ea8
SHA256edfab0d0e2e36369b7f2803f0ac40e043e926f316a8757a757ad39ad7e0db63e
SHA5129748446e8174bace0c358c8033d6097378d93d948bc476b177a4934afb23c2ad3a930e78fd3faf9b61109fe25376f2f3db19ef6ffd93c03abb34228893edbe40
-
Filesize
1KB
MD57e4af8653a174137a424e207c029410d
SHA188e2dde235f2f3e3b935c31daa562d067dd21cc0
SHA25623d7f9df7d94c03c1b5bf4ad0e6388b5aad0f99a002f1b467d051973aee2db8b
SHA512629b513006ebec8c4d21f154089f94305ba67da7548133f44a7ce8428ade02f0b9a56ca7cc96c15dfff80e84ad541a5e24cdbbc1705de5bcede4975f9b1fc050
-
Filesize
6KB
MD5be089ed2c034d8f7334552c8bfbdc69a
SHA1777f02c4f1822bd9ed9872eb92414f2b462aaf32
SHA2562a228e2fda0ed5659c485d4dd32507bfc738e447ce704fe6eb750976862555a0
SHA512bc3ae1a7584f8ea24a43da7b39738d18522f2918a877abffaae8db6fcde3ce8ce59b43e291b329aab2ecc3010a15df6116931b279fd1cdfe95838273b947e937
-
Filesize
5KB
MD5a4176be5d3275fe5496d9808c43b1b25
SHA1c927cf46665eed85ef0b3fbd6ee704919467219f
SHA2567761807c75a2ae5e81879dba3a90d34ca58469ec0b69adbe95db307afe00a6eb
SHA51271b5462124f9ba6fa3462324dfa804e5e30c7d15784d66092274fd06a48d5688ce30c02ecdae398041ab3cd8eabc300a0d8fd113ca76c3fb7b58ad12db2ff238
-
Filesize
6KB
MD5b5cb34caa0baaeccbf5eb4ef35eaab68
SHA10bf109c8780d11f158ec4ceb6d32cdbc8d1101fd
SHA256ba6c106a5c10608a5b6609364cfb7cf86f3112bd63f6b23728ad20136a61c894
SHA5122c28051aa5806cae841bceb0488bb910cf4037a4db1b214154415e9aa2f1860a5dbc60a99a7c1d750480b56cf889eec63dcc1f7088aed045bdf7bd1ac6c07838
-
Filesize
371B
MD562473f09e5db339a5a9a6613fdcd0e3c
SHA1eef8905865f489c5b43f0fedb1a9d9e78b070717
SHA256f164115a921e38981ec933f01c1b8807a158a3643d2e862c215ebead867434df
SHA512bce9823e789b75c5a62ef1e3b5c8dd4436ced823d23a17165a6330723b10dfd81efd35372258808554b380afc44d5d92195598a0703d706c7673343e734567c8
-
Filesize
203B
MD5e27f829217e39da1825c9c11f96442ce
SHA11e6c88511750f6240ec2967cab5bcc44cf1f2740
SHA256a7f4d45aa60ee96f5dcb15d532613d6a4436c131991eaac3631d708365eddaa6
SHA5128f18d6c4b97cff6e3b603e6188c83d8189ebe7167bbe2cd1b135e30e36e2ab07dc8b2887bf167670159967674efbe360e68db4e8a313a12c5a5cdfafad15f924
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5555e2d108452f3e29b57493ca879b669
SHA14e3b10cad25bc359d0f0f84f4a37d4c6c3bd2a49
SHA256024c1f722a45a4a9532e2e57b0098168491e8497c31606d628a2538279e6aa2f
SHA512285e7a3ff9a5ad5b8f5cc19faacdd516a88ec96f2d13736d5796bd875ce4791b514515767545037382fe5abeca697edfa41c8baba7ebee1a29bd76d949a61e53