Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
3064f443768f9e8aa511fc21a15a5b04_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3064f443768f9e8aa511fc21a15a5b04_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3064f443768f9e8aa511fc21a15a5b04_JaffaCakes118.html
-
Size
63KB
-
MD5
3064f443768f9e8aa511fc21a15a5b04
-
SHA1
9cde393dbad359d018be326302578a034796ab2e
-
SHA256
c831e6a9166c000c3496d8a21b3875a4f8bd430240fc8e0724186d5b5ebcf1fc
-
SHA512
67118f7f6c4280ba879935bd84267205509ce7c7e9249ebf36d5ea3cd49652579ba684171f3a96f11e7734a3d067ec9e7466bbaf5bee3986280a2af15829b0da
-
SSDEEP
768:coqi32saIvEMzHpiOpgmhzGs0op+xedGWXfIMQwXVg5DKx6wd6j:ysaaEcHpiOpAs0oCeAWXAAV6DK0wdO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 2340 msedge.exe 2340 msedge.exe 888 identity_helper.exe 888 identity_helper.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1952 2340 msedge.exe 83 PID 2340 wrote to memory of 1952 2340 msedge.exe 83 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 4060 2340 msedge.exe 84 PID 2340 wrote to memory of 1844 2340 msedge.exe 85 PID 2340 wrote to memory of 1844 2340 msedge.exe 85 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86 PID 2340 wrote to memory of 2532 2340 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3064f443768f9e8aa511fc21a15a5b04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd31eb46f8,0x7ffd31eb4708,0x7ffd31eb47182⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17980088204040452629,7742709435837165766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
270B
MD57016da98c9ee9be0f51860006ec887cf
SHA16ca041b4ef274cb9725da7133de55f54030c143e
SHA2567f54f286a4a2a67aebf98249a2b7b7233fcc925de8bd01b9867e962b2afeae9e
SHA512a28603efb1380c34daa0d199f7b23ac14a9ed7a9b596a1e79ba72968c620836d7749c2ccd1dd839ebfe95c7714a9f5b14c69c00600b7a89254b72eda37f08f91
-
Filesize
6KB
MD591a9250d0caebee62e78aceaffa359b7
SHA191a64863acb971fa5ba0b524d89ac530c2acd096
SHA256e44b2125bdaa6794b914672af6f2e3196aa702dcdc6c1d6d6dbc543d90b7be06
SHA5123a4c52eee738728458afe2cde4e1f596835c281e4fdf2d11744c9c8810e58bf3bf3b83bc28dc7f26061a5acda126400a433b08767f2ed03063d15f872b8bc17e
-
Filesize
6KB
MD5e12a15bc1e400dcc9b496bf488a0393c
SHA19f796511fcd702fda9a1b8d71a5d8d4bc5507f0e
SHA256d772dba3cacddf5a487d8dd086fd5633a1d905956f0c42f8d621f36b7d238069
SHA51224c85487727de6f179a22d84b33271e04d45abc634fbef4d4e6114038b08b54d7f8862669fac211f938075ef2e4df594223e2d78d7d73a28dae2047cb18b92f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd9bfc3b3f737d7f97ec79f59ba1610a
SHA10765d54db5d5790ccff6ac4d0fbb18a8bc65d996
SHA256852341a071c268d37693908ccd4f98b6508d95ff01d7fcc2bc115020c6c33989
SHA512c94812b54aaed24576ad8ec45e3441e336b4481ebca7bffd9f5089f1192a51dfd36319f5a057b3582b3d69fe67f1dc264341a43c023be5caac3fe828276bc5de