Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
-
Size
42KB
-
MD5
fcf1cfa4e8a9561a64a3ca10345ad0a7
-
SHA1
bed1e08b83b4bbb20ffba359ec8f0d24f5d6b2f9
-
SHA256
e659f79f8b45d0f69a1f933877f40c834a3bab0fed1c9f1779de72158d17e1e2
-
SHA512
30b5d2e027ff35827f3a3d34f563650d8dd88f3672902e8b5338e3b8af0ad0fc438fcb571c1dd7fc4283521fadca4016ca84b52631ed78eee771eb32e8cef635
-
SSDEEP
768:FPtiEqK1ZtIx82nrjzFky3j06QbKD/my/XwGhuWyd:BtiEP/v2nHzmyT8s/myfFIR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 1084 msedge.exe 1084 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 4976 1084 msedge.exe 85 PID 1084 wrote to memory of 4976 1084 msedge.exe 85 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 3096 1084 msedge.exe 86 PID 1084 wrote to memory of 4788 1084 msedge.exe 87 PID 1084 wrote to memory of 4788 1084 msedge.exe 87 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88 PID 1084 wrote to memory of 3332 1084 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16864241194249072561,13175131052712660918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD5b8c5d6dc597ab68cc41c7e02c3f4469c
SHA12c412ad68363d72b3d4eccf7e2917260c8e42553
SHA25612aafc9f9a1c155bb346a293425b69b0bec7ee98761140a2da098bda57bb80c3
SHA51285b22f4eaf5f5f9bf1725213eac2adf188d1fc6f53fdaf74be59306b6dd2cc659f966f3525d81960807ea2de1a9481f1807d4b9ba697eadc340b0680468e3e40
-
Filesize
6KB
MD56be8865db024be0a44bc38b31b8cc1db
SHA1bbbd6b6fcae3f805dc7898574eaf7eb43e51e2ad
SHA256e436a49a25f0ae7b85ddf9c89a142228347a926e96e0dadd8934caa6154f067e
SHA512e389fb9cd49b3d48bb0ba7585b14ae73e09fe31127190b665931f7eff960cecf71c0ba9c2e61eecfe9ef4d63ec586acb6479dd52a0abfc7c804e90e11337d343
-
Filesize
6KB
MD5e9b8f2e327b035836180e37cc9458e07
SHA11eb3e06e08d3c974e0359b84da55b7c9573ae684
SHA256399acd39c30e2b7f9bfc477746fc10e20896f4bfa2d0359615308517fb1fe4da
SHA512f4d34934dd655407e3bc0e6fe381be8abda236edc33273d0bca929d463c7add6886d43f3270673f0ffddd5b773fee6c00f45dfa6f0f67d9fa472a2c5e15e55f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50a41aa841e47dc24bd34b693fe1434bb
SHA1c4eeacd770f24b9a8e382fcb0873e0b9fd111f08
SHA256d53deafb4766a5596e87cbe5c7d9ed9e11f49b749c477a456cbbeac8f2312f09
SHA51290cf154a937a5807372e38a8d974c413a94e73550496656d14de88023cfb8465fe88e0e644477848844082f1e54ce2f257feadc5744400fe297821c895edafe0