Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
2a1b55483d10355a75bbef4f61ea56c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a1b55483d10355a75bbef4f61ea56c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a1b55483d10355a75bbef4f61ea56c3_JaffaCakes118.html
-
Size
18KB
-
MD5
2a1b55483d10355a75bbef4f61ea56c3
-
SHA1
4a7cd226f23dee5278680140c227af3030517a53
-
SHA256
a8c3901caff1cc1106ee0eb8c52575c58b7a3d7d707d3b568efab60154d4a545
-
SHA512
1e9fb053fc29c611692d5f3f50be67d5a490763a6366380b849e660ef18942892a90f9bed2c39ea0216020557023e75f027d460d7bf139ebb5ca4f93e0683209
-
SSDEEP
384:GyWbErpXBpChMOesS0qZzVD0PN96krwrPoK49jQBHBff:7WbKTpQssS02hsX6WyPoK498Bhff
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 3304 msedge.exe 3304 msedge.exe 3604 identity_helper.exe 3604 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 1924 3304 msedge.exe 83 PID 3304 wrote to memory of 1924 3304 msedge.exe 83 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 5104 3304 msedge.exe 84 PID 3304 wrote to memory of 2152 3304 msedge.exe 85 PID 3304 wrote to memory of 2152 3304 msedge.exe 85 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86 PID 3304 wrote to memory of 2012 3304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a1b55483d10355a75bbef4f61ea56c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb315846f8,0x7ffb31584708,0x7ffb315847182⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10884593440373069791,16894362628227167714,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
324B
MD5f862ddae3886e9a8ee9a8fcc631d2625
SHA14a76b137a08a1d0831f8700d76f1d64256f44da3
SHA2568cbb487a0b7e6730c7f2235bfd0606fe8551b6cce2f263c270c2fd498b8c391b
SHA5123198682914604836e91a568d0e0a3f953bf2881e8cb5719715326c89daf3fa2b8c53e5cff5ae907f299981ece8b6cd4b71048adbae47591bb2d80f9df1e5f656
-
Filesize
6KB
MD50a4c61113761fb4301b61e085c7374ac
SHA1d480b001598ba1da84233c37e2354b94aecbb596
SHA2566ef4ed1500e78d9e5857e516ebf9dd5e3d2e5b54657cbefc2d5b066684899768
SHA512b98410443e60b8d4fa88d99fe83e3b5d6ad236767a16d95e68b11afec5c24c13ea5905603108f7eb668321629df8158051f3dfc4454f03433b9853f02dbfc851
-
Filesize
6KB
MD5ac64261880561b1902e525328759053e
SHA198d7f82b62d45eedded96c0d1414bd7ceeac6cb7
SHA25681bda3d32b5b33ad6cff44720dc80c3312eb9275b3b665464ba19547382408cf
SHA5121485a167010c53ef48f3699f91957898f111776382eddd9266efa5415e2be4b19afede974e6b707cae32e82a1b5af2980c80f95135c19b31852c8e3ea2124a24
-
Filesize
6KB
MD52ed200a05ac2ed2cfe2211d706e11da4
SHA1302d21bdc883627103a4cc7bdd1ac8d325c370be
SHA256b950ab367c87b0bb0567febd4d0a5ca1db42b72d571b7dd6c287fd9e209ccb97
SHA5124a5a7be28cecfdb646e16a276bd77973966fb1b02154d9b1f64842d788d88b3cb362604edd637737c143ff762128b4e58604601b1c5f57d364f0f1802a869b68
-
Filesize
708B
MD53facbf27a986aa7bffa7bb645661772a
SHA1a5f1584dfad320cc247467080a36e5b546e45beb
SHA256a00701fd614d5dfe664c83c0da46f559ad599d2812997e880c35879dd281876e
SHA512ab050419683e29df3ec9da0df0d7971da752b97b8fafa1b7a349742c7b4d70381d603b046bacb693a4749aba8d04526075165f7c58422b63cddf683339785535
-
Filesize
372B
MD5dfd716dded827d4755f3dd912a457f59
SHA1fa4ff5b466dee37c1b64fc78b7b87266d7669dc4
SHA2560f3384f8295ccdc929f7c8466dd26b047f8bba213712cd81f41757431ea6e179
SHA512b5fb1dd21c70586c33a6883baa7601b7a4daf4c814692fd61484f500f416758a51ddaa7cba626e4064810f35228eac343a89e053e06c2ea3c1ecd0328b09c712
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD509ad5ed0e2426fb0e1840e8dd5ad1a8a
SHA112c455987866f34ee06a356b1207d3989ecd135d
SHA256403a240c98c425fa7973fbd08b7e3314d129621985390c0bc6d0edea92280bd9
SHA51293dcaff310bcbe40d21880823f87b160baef4ea469d7d3d0d4a7e184cec88994ce877dde190ac99a792087584cc6f3c4b4f860833cfe08b1af7a66385ec06816