Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
42c73171290408c2c29664ad32f2bd7e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42c73171290408c2c29664ad32f2bd7e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42c73171290408c2c29664ad32f2bd7e_JaffaCakes118.html
-
Size
40KB
-
MD5
42c73171290408c2c29664ad32f2bd7e
-
SHA1
cce0c48bbba7d7bea5d164e293971189401104da
-
SHA256
a77f09f34ded1b8ca2b7bebb054a613faa9255531e81fc9748f7f08169100bc6
-
SHA512
23151c2096d441995ec52380f1a9208472714895e0fb6928b2cf69b771a36f2749a464a6dfa9108b41661085d29d57b829c546883c44a35c924c5902525f369f
-
SSDEEP
768:fswWWCBBhBlywyUvdB5+RW7UUCC7rMfhlcFF7yfVDM:fFWWCBBpyw5n7YfhlcFF7oDM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 884 msedge.exe 884 msedge.exe 4532 msedge.exe 4532 msedge.exe 4764 identity_helper.exe 4764 identity_helper.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4084 4532 msedge.exe 82 PID 4532 wrote to memory of 4084 4532 msedge.exe 82 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 892 4532 msedge.exe 84 PID 4532 wrote to memory of 884 4532 msedge.exe 85 PID 4532 wrote to memory of 884 4532 msedge.exe 85 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86 PID 4532 wrote to memory of 3088 4532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42c73171290408c2c29664ad32f2bd7e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5c2c46f8,0x7ffe5c2c4708,0x7ffe5c2c47182⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13988495034774303194,2568033059361665004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
758B
MD56a55cbf705778d276dbbc924fe00605c
SHA165914f6b58bb4914285868ac2d09f38387f1d315
SHA256f7d24a5959fed830c0eda3c8e52446f76b1ebc6bd132fd3ca75cb53c21d0d193
SHA512ccd1d6d518ac916d6406b073648d934c4a2faa5f790fd8b2bfcaba9d28e8dbafd31dfd735e1ba64e2334dad753b38e1814131e8be4385bfd86d936ad24aca90d
-
Filesize
6KB
MD55889fd9cde70a802f66fe5239d639d45
SHA1b40b1f3c05bca090061760db9d53774fcadd7ac9
SHA25621638dd6228f2ed9ab3bcc9872afc2bbd2b05d0350401a92075038e4ff7071ee
SHA5126518e70cfbb3fc8b0df595f61484a26f4831efdafbbad584f27df77adbb3f7ca28832c6ecee9c2ff3fb0911b3cb375d643ccd6b1d3c24d47719401db38b15256
-
Filesize
6KB
MD56f15401301984f417a9b1b4fd0cea4fd
SHA1b3f22f59d1b8019b53a77b2b6e9f97258e335f9d
SHA2562e0c0b8d10f14a55ca73ae2c39df5a650a6858fc952a10bdbbee8315bb29c903
SHA5124770c64c16ee322c0d50f94eac657bfe738b8edd91ce8845d3f5291784d74d3b08951f7adae42d528d40e1876faeccc9fa91590a95832fe807b7653847e39c10
-
Filesize
371B
MD538ce588c809e07ae9c0ebee0d381268b
SHA126805f736795f6c24e02602b5cc0ab7fcc9b2c6e
SHA2562924b92cc2776fea817e7c9497b9bdbeab5c1dd3d54dc257040dde52cc7076aa
SHA512f93804e5d6c227ddbe4c75a5558379bd3d32105ca05f9454138a2df9891420947cf54df0c37517dee7644aa8b4136e1114315c8f7c2fe325c889634ef5cf5bb9
-
Filesize
369B
MD50a254b739755927454323575e0b1ef05
SHA13c20e95efe481780f62b18ada0742161df3e5171
SHA256f098a242d9fa6fb7e63a7636cfc930f2fbc61fddadcf4f7dfb97e86a22c32e0e
SHA512686670309db53a5118026cbc2bbcac8652d17c6fc13cc87349b9a67fcbbf95a67f9d30144e1de0325dbaa4d5e33b6401964fc44a16c10ac2aeb14e1aaaad91eb
-
Filesize
369B
MD5f7fcdaced59ea9fb96ff62f0c69cb525
SHA114923caac4e1fa85220a02d925ec89f2fe16a78c
SHA256babb14345dc60cd3914db3274b0223a3eb8c9d3079e849e8729374592d56d551
SHA51289db0a2e85d703b772b6b15a3132871cf1738c4eafea554c7eb53d2ce6c226aba7c50c32d8d28804759fe6199ea0b8bdffd2c5ec83b41fdf6e97065e127f4af2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55fdf8af5a4af3a129853c5651c560474
SHA10bf17b625682c545ebbe6758eb47f0995ce4a525
SHA2563c81012d068243d4c1fc4bd4fdca2c3a1a7b283267c33ef379ee66d19c10576d
SHA51201ee2e80f76de67fb9205af17b9aba825368ce9caa90231cdfbb218c73208a4a6292b45a4128761b7f7965717be7e7e4dcc0e771b5ee576b4ced5ce881385a20