Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
2df1fc83bb6393b698f6c69e4f454163_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2df1fc83bb6393b698f6c69e4f454163_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2df1fc83bb6393b698f6c69e4f454163_JaffaCakes118.html
-
Size
10KB
-
MD5
2df1fc83bb6393b698f6c69e4f454163
-
SHA1
ad3a35d53df3a41fa6be394d5148460b1e85a90c
-
SHA256
6d161ec811d0fa8bc274956bb9325d31718c7415a996575d105f3e6d40797308
-
SHA512
46d506322b658f7b0a0bbc6cdbf0491baa23710ac6762b21392fd864e1f1a05307830b23a6b9ae83b6b8f90b714652bf5834141044692215b220599a1edcc8be
-
SSDEEP
96:uzVs+ux7YrwLLY1k9o84d12ef7CSTU7GT/kpWps3HKaU87Xh2p/UGUZO7Xh2227a:csz7MwAYS/CaoCsZzPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1564 msedge.exe 1564 msedge.exe 4088 msedge.exe 4088 msedge.exe 3980 identity_helper.exe 3980 identity_helper.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3796 4088 msedge.exe 85 PID 4088 wrote to memory of 3796 4088 msedge.exe 85 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1504 4088 msedge.exe 86 PID 4088 wrote to memory of 1564 4088 msedge.exe 87 PID 4088 wrote to memory of 1564 4088 msedge.exe 87 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88 PID 4088 wrote to memory of 3408 4088 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2df1fc83bb6393b698f6c69e4f454163_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa461946f8,0x7ffa46194708,0x7ffa461947182⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16183403381447844479,8121439436204670624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\30350353-1c21-4e3c-b0db-63f6129cfc71.tmp
Filesize6KB
MD5f9acdf03e436914fd5520dc89d56fb65
SHA1adc704d338dfb809f4d1de2eb19488cb763a07d1
SHA256ccc4376df3e7454c50d3844052aa32771de40214dada55cb59d789a85c5e5c50
SHA5121b72454da9a4c760e01c6d9f599ea6d6092429a72b47e2683539ac9267cd215f2f33d5d4fa39ba8d07eacfaa51cadb2b7e1d72f16f229e1959109dd8ee9f9fae
-
Filesize
6KB
MD500c457935ac9a24ec7fd767d58cb21e8
SHA11996703137915ababf71077c06c9bcf5bd4ccde8
SHA25655b2d7b0a69a2d59afdb33c424c4d80ad8a0aa9a6196dc13ebabc5ed9a7e7988
SHA512eeff20a5ac76bef3e980f3627640706b0a2ae4696c80433ad1fe6e7f80dde626c188d7dd03d8051905459310b0d8876f005fc459feab7a4081ef9b1ad5ec70c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ca51a6185731218e9dea10b62bf8f25e
SHA1d7ff9f2793a3e58f76851180a6a8b88a8ae65547
SHA256cf25f062a4e0118a8dae6829c26693498d6b7b1adc8bab645cbca8f83a2a43b9
SHA5123c11fb3c3e41e02f2f946cdec620f7a81923b61e57f4977d4f51bd5e3ab7bdcc8aad7c983453f68b358a32e3e5fc3b10ed645702d29a17ce7bfce6a74bd553d0