Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df868a9ed632e9b37b013391f007d694_JaffaCakes118.html
-
Size
20KB
-
MD5
df868a9ed632e9b37b013391f007d694
-
SHA1
371a967843ba85cfce359a41e019d456d31457f0
-
SHA256
07cb32d65827eba01f6573f349ec43ffd890efbf086bc3d7431c9f1d739c2146
-
SHA512
d08230dd8be86120aecb8a343d6edeb801eb1bf6def5b8f9560746267601121055f55deea18c002ff456e23db39a7365de2809eb210896d4b53bea9e3e4b4f7f
-
SSDEEP
384:y4mzpuZ9Yxg0KFKrOuBWdwSSGDyQpfexacEzkBCw4oiTfFjF0JFPTvPg6DN9t2s:yxzpfKY6ZSGDyQpfooPwriTfFjF0JFPF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 4212 msedge.exe 4212 msedge.exe 1688 identity_helper.exe 1688 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1324 4212 msedge.exe 83 PID 4212 wrote to memory of 1324 4212 msedge.exe 83 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 228 4212 msedge.exe 84 PID 4212 wrote to memory of 1868 4212 msedge.exe 85 PID 4212 wrote to memory of 1868 4212 msedge.exe 85 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86 PID 4212 wrote to memory of 2896 4212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df868a9ed632e9b37b013391f007d694_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd39046f8,0x7ffdd3904708,0x7ffdd39047182⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3680982769672022006,1397709188124824202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
619B
MD5e59ec3efe4b0d7db725338f644bded93
SHA1052f4204d8f837919ce0afa385189119d0c573f9
SHA2565605931f104f25530a6f033ead94034e58e1679115785c52558f89a557167762
SHA51238d360e714c5052c0f1f79ffbe42c9e56ef592807f2fb678bc4057fa84bf55adf973b0f13097a1447a7d67520cb465a1f02941e9189e19a2e72b0dffe0094e7f
-
Filesize
5KB
MD54bd04306abecbf2c73748f5b13a6857e
SHA10073d204076a1e675cdfd5cf0b4b45bd6b2fbc9c
SHA2562beee71d72b5cc179adeddf530eb725b085cec8f3d15691b01c7183f4da627c6
SHA51261b5c1d10ccd534f6cad124a156ff9feeab8593134dcfa8fc9ae7f44d2d5fea172792b0dfeecba2f4fb97da0ea88abf7067a60a88f0f046b191a6992e5286f70
-
Filesize
6KB
MD54ee835c98d9c90a6105f677e14f6a786
SHA10495dcae742217d8b37c90ced52260122c35b8cd
SHA256196923ab5d43f54d45b5f2b29ee00c9393159c5ab53c7fa6b8e781329ca02bfb
SHA5126b7687c7a8393d1efd4feffc9db14cdd07429097df319b8660edbcbde7ed4e629a3ffd5e0ad3ca6d4bb9c9034a1efab997f014025a4cf0420c352e6e628cbfa2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56a9149baca0a18f153a8647edd5fb49c
SHA139272a3e190bba0ebe0149a24ac33dcfc9aef1d7
SHA2561f279ad466bd3a12fae6a02297de7f4057ecf21a3fddc62b83f67b88c9d36d23
SHA512ab95ff5fa37597a7c548cb19e9e5c4956b79b2b17bc1cb66eaa250aebb21533c9e6e2e1ccfc351202b848b84bebd68e79fb7e2ba18fbd7bcf7cdcd5ea5c943d0