Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
9fa0ede1d012474160da59354be37df5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9fa0ede1d012474160da59354be37df5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
9fa0ede1d012474160da59354be37df5_JaffaCakes118.html
-
Size
34KB
-
MD5
9fa0ede1d012474160da59354be37df5
-
SHA1
26ee3710d89cb9454594d0b7e15bc0c7033c1676
-
SHA256
16c33f7e309a509ba8f5b52c37205847fabfc2f181e396615dc4dde72f404064
-
SHA512
5f59eb239322d0fe2d594a9ee91ad6a6202595498c757d64b75d7efa1457f49fc22f1b8e7f53a996654a8532b90d83c3b9c7ca6b8ea211e9f0a69ce1b5212a25
-
SSDEEP
384:+3GfKCtothbk7e6C1bU5xiEPjw7Ojr0a2mbKy7V0fqHGb9s:Gvthky/bPEPjwaPbKyJ0fqHGb9s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4508 msedge.exe 4508 msedge.exe 1160 identity_helper.exe 1160 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4532 4508 msedge.exe 79 PID 4508 wrote to memory of 4532 4508 msedge.exe 79 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 3216 4508 msedge.exe 81 PID 4508 wrote to memory of 4556 4508 msedge.exe 82 PID 4508 wrote to memory of 4556 4508 msedge.exe 82 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83 PID 4508 wrote to memory of 2408 4508 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9fa0ede1d012474160da59354be37df5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95d7346f8,0x7ff95d734708,0x7ff95d7347182⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,12353987187194246507,8348923874571508939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f2b89786328f202288ba1cf2b7879c17
SHA165632d557469221dadb72c39e4fc6af5992e4f2e
SHA25669474575bb9fc419b3df76f75102b6f430e0f4c0b38d92eb636c60f6daec8c0b
SHA512646539e3a167b6f2b2f8479fde242e414acab0823bd44d27fc75182b51462e1bc50f339b1152da86f2f4f59d020d98709d49dbfa709496014a39f3b172baee4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52f5e0d76f84a717f51c57e3815c21676
SHA1c54e67dff58dde3c749ce011b7a3bb5f708c6dba
SHA256c238027f35c476b2edcfdcf79f4b28bc43ab5dbc19df9fd5e8e875b0ca9e8437
SHA512d60f5ece90e0749ad189f6e4aa0779b472a3e4df083f7e5a0dcaf2e0f7fab0f88d52d6752b1ea6b849ad7386c69a0832feed62e906d77035f41d88a63f623480
-
Filesize
1KB
MD5cfd30cc0b0426e203135a2c605cf2df8
SHA1c4b14c5563300f2a3857d46d14055c45df1dbdea
SHA25692dab6ebdb8e4b35f03f532b295c25607210b09eed9390c769f9a55a104d4826
SHA512d8cb2a909a8e2a06f5c722069eea503ae0b3a705f45216e7c36925c4f41a9c60136f5b193e470063dcf24ed551569000e6b9a4ecebdc45133ce68649d9e72945
-
Filesize
6KB
MD54ec912aa3d39b0a3b6a63f1d7a5e3bdc
SHA13f4ea64f570f198307c35f50da08026d0dd19d42
SHA256db1aadd53a522f7360e69e62e4062fb061a2dec1dd6e285d14ca9a75c76ea636
SHA512afe06b63442f841ec4090031666c07a661e00ef9ae9d84aab6544ef4e5f3d7d8b9ac22d1412bcf8d9184b47c886c19a543bd99011d4a6f0f5eadad4252d0751b
-
Filesize
7KB
MD59ddd0f123ecca1f8a675019201270f9e
SHA1cf7fa995e9b6f9f3df62ff5381490d27b021807e
SHA2568c44d089beb8b2a0858ec8c1474930ba41969d314ddaa6de12d4834caa7c8a4a
SHA51243bd23feb6336180c23410835ecb2ea538a34728631c70f73f73a332ec4cb5e5d3960c68d971e36bcbb6b8dd08f75d6202e6aa4372dce2e39e72bf00a50398ed
-
Filesize
6KB
MD571670bccc368c4ce42230bc9acc18628
SHA11e03914a2be5a3f02d3ed7d8d7a7cf6f7bf84c45
SHA256d68b4782d34f38a2f41a234e4c7ff7286c3e19d7ee40dfd40423fa9926577376
SHA5120f73ef549628310ca0b0ea19b976c662cdc470e5a615ba785a1caac6a86b3b805b0fbb3cfcad6785dc4b2199b619e7f638aa94a1ef7b41c0125ea533961a450f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dac142c1486daf4498dd144d9f5dbf74
SHA158ea48bb1924d9c0d99f710ed809ba49d9fe7eef
SHA25658eb0bdef1bb90527045014ff8d1e3b8b3804af4bb7b73f4668998ebb9fa6a54
SHA512632149ae58762b430a8283a50728740f6470e794dca75f2861996c4d6dd3157bf2291e4e15f24537bc7ad4b88ce3a4d5f8544b7a2536c24862de9362eb2b3687