Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
29c7b6f1ce5c7636bf8e1877875f62e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29c7b6f1ce5c7636bf8e1877875f62e9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29c7b6f1ce5c7636bf8e1877875f62e9_JaffaCakes118.html
-
Size
41KB
-
MD5
29c7b6f1ce5c7636bf8e1877875f62e9
-
SHA1
10466ec7e20a21d74bb2dcb4a2bd3e309f724cdc
-
SHA256
41aabd7ab2c4c07dcf077af698dde0dd8bb385219315b365903b0a93c6485758
-
SHA512
b55da8d328b793f8a4b5427e7c47e68a1318b7465c4227c8f198522d595eebc55b525f7084fcfbfaf0eb5db62723c1c251be6a1edef98c7d15e13fd217aeadb9
-
SSDEEP
768:Upd8wnIBbEmj5InGgQhU1vEme89CuLVZKYrjPaUo6ilXzFi4o/W+xjfzIBkeZvuD:qGwnIuGh2COZp/P47jFi4o/Lzm5p3eNz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 1404 msedge.exe 1404 msedge.exe 1708 identity_helper.exe 1708 identity_helper.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4380 1404 msedge.exe 83 PID 1404 wrote to memory of 4380 1404 msedge.exe 83 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 5060 1404 msedge.exe 85 PID 1404 wrote to memory of 3676 1404 msedge.exe 86 PID 1404 wrote to memory of 3676 1404 msedge.exe 86 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87 PID 1404 wrote to memory of 1184 1404 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29c7b6f1ce5c7636bf8e1877875f62e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd424546f8,0x7ffd42454708,0x7ffd424547182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1420400133972407290,12990148831611962614,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
678B
MD59b1e099dab74f07a25c805643a263800
SHA15e2941e01c89b40a356c5993ba9e34105293ff56
SHA2566eee30fcf1a245067f1ca9bf7f7176aae49ed24b0567b897d5caa50260150c4a
SHA512dac511fbc2994e7e1dfaaa408859b6f685b549abd42719b4ca499bfa289fed1770c67247933c4498d3be987869208167b5291076e286cf8df96ebbfdfa880890
-
Filesize
6KB
MD5e7dbb46350d5265eff5684d1c8055f3a
SHA14a1213d3b85f3a160b1cb8fb47f875d46534b93f
SHA256bb70e4029b1388c527a955ba92a59663c3e4483bc65aa107d35ca3862a73f5bd
SHA512067cf358a9ee2e68359c2d87282f924339b3efa913b86ebeba430f5c43da7a7c3a12234f012b43fafc00a31b35cd13a7af844132959a686b1339dd86c58b3848
-
Filesize
6KB
MD5065e817b3bd77f3dafbf5592409ac129
SHA12db7bfc3e736cf1f6bcc80ab354430f47b9f7697
SHA256bd77c73b3f0c5518d9dfff810b41df6e37cb8c68430958b46217faa8da7afb00
SHA512154ee93a2de66bbe8b6fc200931888ab2725a09fe53f18cac6eee2c220e6bd9165ad53514fd99ac1cdcb421652b158be3ef244c3823ea726c7531a5521f859c6
-
Filesize
6KB
MD5274189af334a6b9a74848d5f2102af30
SHA10f3cc421106d34f4c8e0ef2a52ba6a5f264a378e
SHA256df8fb4224d7a878e9469fe845942fcdd2d4085786f3053203e5612be703c90e6
SHA512c431be9659fb39f40b15be7c6a90341f73f8d928f71f60205759e6ea0cd69cdb5c0b813b596a06a3fe5020ba439a68618519136f01a80f1e73dbd076181e5f79
-
Filesize
6KB
MD57a10b382ccf8fcc449c4fec9f423fd6e
SHA1adb3fdb3f71860bf5dd3322752afbae82f41bb2f
SHA256a6f210e7e7c2424209e6d84895dad11fec4d069e29b311d2d81b198527a2a454
SHA5129b1b943856cc136c1f62ab2a896b3389b37c43653c631e9b37fa88dafe0611c3ff0ac0072f50dbc7244175eebe9b11202783226bcdcf0748a07f24908ad2f2ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59fb1344e5be9a6b55b0684ce7ec15379
SHA18445108160a8593a7c5b65d189112c78be875e89
SHA25662f56c9c8f41f3b7ff0d99d731e54573101a6ac32b4fb36b44129bee9ba168fc
SHA512b13ffadf78487487f3222b05374673ca3b6ecaa69c2d768913c3a6bd3435deabc46298be4df542391eee3cf8bbe9ee4bc2a8d96e8f474f78f13a026d09b9dfa9