Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
fd1efab5ea70607610a5e9fa59b195f4_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd1efab5ea70607610a5e9fa59b195f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd1efab5ea70607610a5e9fa59b195f4_JaffaCakes118.html
-
Size
38KB
-
MD5
fd1efab5ea70607610a5e9fa59b195f4
-
SHA1
1500574e2d51f73dff01e46f67458427404b2837
-
SHA256
967d6d2cf4fadb975c58405be22f1dc162be7c33a3aa08275d8792b92722da4c
-
SHA512
669751470a356a4ddd8ce8903f2ffc29d1673d2593d7a6d682a43ddc83cb976ce1887c44ecea7d1257421f23050421015da952361d96cbbfc0488945b2d7464d
-
SSDEEP
768:ttuc6IxLVIpBU4qHWy6gAH6zhqfJx/aeZzeeeeeWP2Wdzj7pI5ppidl:LBIpBpqHWyuH6z8fJxyeZzeeeeeWP3d9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 2452 msedge.exe 2452 msedge.exe 2368 identity_helper.exe 2368 identity_helper.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3760 2452 msedge.exe 82 PID 2452 wrote to memory of 3760 2452 msedge.exe 82 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4916 2452 msedge.exe 83 PID 2452 wrote to memory of 4016 2452 msedge.exe 84 PID 2452 wrote to memory of 4016 2452 msedge.exe 84 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85 PID 2452 wrote to memory of 2576 2452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd1efab5ea70607610a5e9fa59b195f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb757a46f8,0x7ffb757a4708,0x7ffb757a47182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,2655617504620272072,6203282498171999865,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
645B
MD5fcc87315d42253e69e683299107bb8c0
SHA13a3386d73d6ccf83c820353aabf2d3e9dbffdc93
SHA2566bf28301e6c300b43af44eec27b55524813abab0bb95856c86773035d4097ad6
SHA5125763e4112472bac60eeb307a057046e96a9e04b0d6e3bed6ba9a768eb1ed94c1c370aa120e28e4359742c5f1459449ddaf952e4615728e3b18fcebf027f8f0af
-
Filesize
5KB
MD54a92e3be6b7cddd58a61e7d72bec7701
SHA151e200d4962d049dcd6c258cd5564a92ef39980b
SHA2569ba71c3dfdbb9bd8ac01f6aa84b05de9cb39ea1264b42a310b3b3bd64d6d0140
SHA5129b9e20a235c611c95548bbb1adc17e96ecf87f2ec430026a5d60a9b5ceb9ae806cdebe845b4d6545274cfcb7bd745c4c0b52f477b82c68d7fa41b54afadc2e43
-
Filesize
6KB
MD5ce91dacb36c3c54c199b416020eb5d7d
SHA1b18763e2f67bc44546613e4f21680a122696690f
SHA256f3fc248cb585641b0964c0e146fe20f242e565c3ebcb6dd526056d4052ec9c2d
SHA512dec9214b73d4f0ac355c53f0d1010bb6d12d10f0d16b47f5174734daa9fd17163372a8973acfa8e393e03fedc43075b1fc12b8b3f27527dbb647e58aafde5721
-
Filesize
6KB
MD527dcff5cd1c1938f87553e069ba35a3c
SHA1e0bd51819761dc450d76a2411b793a44be4df1cc
SHA2569037ff120363da1ae3a4c8b3ed61cdd647cd6a9d17485e0cf788bac91b5865a1
SHA512010c9b64d7086320002936ae12bac7eb1c0198929bf2db5025326c6e3c3693f4c12808ca0bb178da84f884c46b3ca0185f6bef1b395832b4d37fc0831c7e804f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD566b3820cb9f15be577ded1e99188287f
SHA112b8e84d19bb66ea7afe917e372bed92df091b25
SHA256e6f3f66e351abaa350f8f29248b3f6dab6dcc23daa5fae8e981720634af8fce8
SHA512fdf44ccb6e57c3e63ce98fa9868528d43f8d117b1440411eaed769c5c3cbaac7728d976c737e40213ca4eddc637616ede7b36007f6ab7ec60f97ef3b8f9b7191