Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
f0b70cd466e3652e8f9e61dc05fcade9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0b70cd466e3652e8f9e61dc05fcade9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0b70cd466e3652e8f9e61dc05fcade9_JaffaCakes118.html
-
Size
90KB
-
MD5
f0b70cd466e3652e8f9e61dc05fcade9
-
SHA1
bb6c0f4dd0043850d6c7328655d05dd59253eeef
-
SHA256
ca71529819550bfce66c6a84eaa378940770fd5114bf72e5b5c293d9ba3b8388
-
SHA512
e68bc8f79c3b2024eb4189d745e95ca7063ba1c6182fdd647420748d2cee2fc03c8de7ddaf8e8588d36cde6a0ad0c55e10f11c94360602b722082e1ff422a5cf
-
SSDEEP
1536:v1P1T1b4BuolaQh6KjIa1c6iK7FgEPOKioeVtsOV0343CAL:d9RaaGjIaviKCEmlvF034Si
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 740 msedge.exe 740 msedge.exe 1884 identity_helper.exe 1884 identity_helper.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 4404 740 msedge.exe 82 PID 740 wrote to memory of 4404 740 msedge.exe 82 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 1888 740 msedge.exe 83 PID 740 wrote to memory of 2260 740 msedge.exe 84 PID 740 wrote to memory of 2260 740 msedge.exe 84 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85 PID 740 wrote to memory of 4012 740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0b70cd466e3652e8f9e61dc05fcade9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd39046f8,0x7ffdd3904708,0x7ffdd39047182⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10570659849996903848,2894969248108612622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x44c 0x3401⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
921B
MD5e45bab8e885b1ee35f22fe42cb22d933
SHA1a53bd6d5dec0a0a1e0b7aae52280e680b8c5497b
SHA2566cd709d8774c39b71d65d36d618d64603331718f295a1fd7acd7ab457ce5871b
SHA5124307998e7e592d10afde7c0bdc4cb2a3818ec28f5ea9a09e1b5767b937c8e883bf38875bc158665d1f62d15c49d723d81a16e68dc546540a1c0c6031e1dccd33
-
Filesize
5KB
MD5141610d912d0767f8ffc53de1a37dea9
SHA13430e834a4b8ed910f8ab701a15da18ac9019010
SHA2567cbd4aed0732814d63e828e12d2646b38bd5477b41fadc8a7c5d522f7fe5cd7b
SHA512e301cbed4764880a435227105233afc8b6eb69c83b300117c5aff85003b02ac33a4aad6fa55cf8deca23878f667f365f2036c1a3860ccbe111db28777311ce99
-
Filesize
6KB
MD5dff975e6fb347bb90e4805b90ba2ce2a
SHA1e07596f2600d50d86b136646aa97796de59c999e
SHA256460114ff7f19ff2a51405303fb91448d20e5644101eae3235186034b97b96407
SHA512bfc1fdeb6cf35217cf335054345bca5ab872920a99cc8e17f65f673e4b21d98ca24507787410bb48a591d4224d4ae2ce487a3046e7984b10c4307d81d4ba57c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d3e8e379-0e1d-4254-ba20-558a7ade5c2c.tmp
Filesize6KB
MD510a1812b63c4a3c1ab07d9c56df93134
SHA1bdee866d7650bf0a564ea759e66d60c42d8fe685
SHA256f1f90c05547866eff7ab505c8281dd54844ee6d279a37f1dfc050ad8185a8d3c
SHA512c7d5a8960f918bb8c99e02a8e13e6807cc8295397ef98e47da932a7bcb016fe30229ec0bce597a50b79e2cce15ce79ecccb6a5acda18fe4b598c210a1d57fbde
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD550bf8a115c63d24f1e65e67908d43f18
SHA1f126b50ef7bca8b3c1f86e9f0266fa1f0a60d6a0
SHA256b140d32d75118ecd460c42fc1c1b18f4ecc9dc4481f27b39fc30d638a73a3fd2
SHA512a0e5e5bab77acd0c26407f4b2bfe76b03ffb477c30c80a48ade210555cefda973068ea9c1b9523f11d8a6c2583b3da7e624d784114ac2cacb1159a1b17144bf5