Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
9d62b5436ee89c0ec7606135f49ecaa1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d62b5436ee89c0ec7606135f49ecaa1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9d62b5436ee89c0ec7606135f49ecaa1_JaffaCakes118.html
-
Size
328KB
-
MD5
9d62b5436ee89c0ec7606135f49ecaa1
-
SHA1
3a3b642935529918f35987c23b38858650030d4c
-
SHA256
8d89e1eeb264d226d1a237fbaedc1f28df2282ae746b3560e6d79fc0889a6f88
-
SHA512
94813d7f98ebdd1293b873f8f3cc5452546dd0a9feb9a491e19244c79b911fbee142bb11d174cdb67625eaa81e37918c16a92038b412606e6e57f884458458a1
-
SSDEEP
3072:7owSq/WLPBY45J/5Uf/UuiyqCwF20BNgqfirIAv0upMegx0lKS1vFZNWs:7owSq/yPJGpfwF20cHC6lKS1vFZN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 860 msedge.exe 860 msedge.exe 1824 msedge.exe 1824 msedge.exe 2824 identity_helper.exe 2824 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4084 1824 msedge.exe 80 PID 1824 wrote to memory of 4084 1824 msedge.exe 80 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 3856 1824 msedge.exe 81 PID 1824 wrote to memory of 860 1824 msedge.exe 82 PID 1824 wrote to memory of 860 1824 msedge.exe 82 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9d62b5436ee89c0ec7606135f49ecaa1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffccfeb46f8,0x7ffccfeb4708,0x7ffccfeb47182⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12007153331084750657,7358868034914862501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c847a01e50daee7fc8bd1c9f3e6edea7
SHA1f54d0935647c44531962a58c170e923fcdfb3a44
SHA256395254937274d994083071ab64d204dfffef7850adcf4cf97ff1541fcf75277f
SHA512d339a8f8840471b7c0d3004d7a3763f81020cee2e2c6043eb5facaffa9da080335aa2a91082e0ba00144c2ed74056db91787c1fc9d54c6142abe3ba985d467ad
-
Filesize
791B
MD5789880ab2f4818c45cdc6caa14710af0
SHA1044c705b0af9ad1c2295fff82467627e87794785
SHA256dd1718e8f3ce17a46bdf547be6f8150964d163d3a0fc443c1fe59701de678c1b
SHA512a2f01a7977f437aac0af0ae7ffa37583900558f2e17d8de1604b7ce0214118a41e794c536b269216564127e0dde5053cf5e06910ad31600dfb7e44fd2cccd7b8
-
Filesize
6KB
MD58bfda24112ab5239c964ac8b9de36440
SHA1b96acf17edf47a28ecd30becc9c2d55846a7ac5c
SHA256ab85159f0cad159a2400f91624f1b0b8028966f296e6ac4afb70c7797ed0dc23
SHA5128dd96aedeb6db82c1e782d53aa244b7b9242c9ad9f59f29b0caeab938e9a8caacbb753c418657a2df4df76e89044491f14c4198a90230ae5ddb13250549039f5
-
Filesize
5KB
MD5f53091637ab8e4322c84acc0448b0b6a
SHA1700acfdd08a7eec7f09bc1a053c1894c8d3b01ab
SHA2562674b4d3127de8932eeb3178b6fc0e06b76a0d925afe5cced75368fa9e8017be
SHA51216ade2b19428f8b3685749a8b9015080ae9cb8fa1b90c5af7594e79258617e6b16fd2f314310dbf471852bdec9de752a09ebb62b3731fb87dbc0fe0aa673655f
-
Filesize
6KB
MD549fdecd50924b96c92dc02b450bcab37
SHA1393116db03141f25a1a6a8d673db1dc1251e4a9b
SHA2564d1875944df759497fd96ff08295170414d98e9f603b5ea2d2bea37f29338d81
SHA512806dceda369f903ef4dbf445a266d32a93ac8db8d88b7736435feb784a56ed9bb3c0b1aa772b919730776968dfa6dee1c8f30fb9273964475762c52346b3110a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53e7bfc7c68d63166a7a3a8d75a6999e7
SHA164dc89a9e34355b3b68b19bcdc02197218ff2211
SHA25669a01c51a5d7b40f88f4e5451d85b05dc26dd6fdfa13b1f889da95b817ee63cd
SHA512accbd7c8b860b4f4a7bb5fc31f51507ab3655f61bda2b2136b0b3d20f700442213a67483d9f0622e7dffccbfdc96a2c6d8285f483ee16b1158394684e9263e16