Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
2b9b97e835ac22c201be0b1d23c823d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b9b97e835ac22c201be0b1d23c823d8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b9b97e835ac22c201be0b1d23c823d8_JaffaCakes118.html
-
Size
26KB
-
MD5
2b9b97e835ac22c201be0b1d23c823d8
-
SHA1
a5e6b5987f22c27cf7087034262ee30d1f0b4d0c
-
SHA256
403ee3cfcbd8c25873faf3d58cdafe1a34e379cce1bc1619dda674894b27dd70
-
SHA512
c408faf8fe94558374bad413be02c853eccdc0d6ecb0b680c9b719762f28bf14fc4e52df6f747dba43889690048820e680e0e5f658b7b55860dce0c391f22307
-
SSDEEP
768:SC+uItfutD64kiwyjCo+7ADEyBMsB5F/nNhXKG5fMV:SCTItfutDrvwyjCrADEyBMsB5F/nNhXw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 368 msedge.exe 368 msedge.exe 4584 identity_helper.exe 4584 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 4148 368 msedge.exe 83 PID 368 wrote to memory of 4148 368 msedge.exe 83 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4848 368 msedge.exe 84 PID 368 wrote to memory of 4884 368 msedge.exe 85 PID 368 wrote to memory of 4884 368 msedge.exe 85 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86 PID 368 wrote to memory of 3508 368 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b9b97e835ac22c201be0b1d23c823d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa35546f8,0x7ffaa3554708,0x7ffaa35547182⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,490623837840881245,13992429818990798822,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD530719b8d55558c7f58d95d7ebe32e078
SHA1445a9e1ea8c5013908c0349ce98b1badef6b9a73
SHA256915f101c9e49845436544654b1454a9d881b15ae3a1422caf737fb0161cd1b73
SHA512ef1525673559bb16270b7583a32f5a32c8fee86f1647639d8da0f5e6cf798b96aa8be000e5726f5b44542f579ac284aa4867ecbef46d8a88d9d547c1ce560fd6
-
Filesize
6KB
MD533a3b671558832ea2bf197da6bc3cd6b
SHA196a19143fbe72c3e4601667edcb23e0afd87154d
SHA25665bcfe6e9f1e20f4c820ec88e6b5e099c998ee67bbf7ec2912435d5900c177cf
SHA51249d56038bbac829cc6248fc87e84044ffc57b8adbccc15b3e24b31a20824ac29b54bf53b2c18576d4d920c0cf3a2a6893cbd53c4e38704e78d6a0e0e73acf519
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d63cb0a912199bd542440fbc4566e6cb
SHA12c1f9db49c90292451eb2f0e24cc68ee12caf2c9
SHA256b3ff67fa3eb6c1ba8251e9de16034f4605a933aa7d9c13b7ae8f15e29f03c5f6
SHA512abfe378a6649c8feb9544fc867e029b8b75c4f38bfd0f21f91a478d6a3e2dea02d5b421a1b0da0692631cc799a8e8ea024fe9d096516b8a1938d96d270496986