Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
085b4d8ed5d750adfefe5db989337023_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
085b4d8ed5d750adfefe5db989337023_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
085b4d8ed5d750adfefe5db989337023_JaffaCakes118.html
-
Size
14KB
-
MD5
085b4d8ed5d750adfefe5db989337023
-
SHA1
90f1a5a25ee4dfe223e7ebdfe70d8ce48f7c7c35
-
SHA256
d9a6fc6e99aedb4645fd05629e21787e38da1dbe509534213fd73b120365a908
-
SHA512
12a0e3844466f9f186e78b8ec39f160dcdfb5a4caf3bb76adc81fab6646feaec3efd744e698ec6034098572790a65b6f80409c09dec3fb6e3b7e90b3d0773cb9
-
SSDEEP
384:ZYg/4cUfABJwN3/CKxGGVSGo5ag6rFVJ2:4cU4B8qKx+yM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 924 msedge.exe 924 msedge.exe 4912 identity_helper.exe 4912 identity_helper.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 924 wrote to memory of 3636 924 msedge.exe 83 PID 924 wrote to memory of 3636 924 msedge.exe 83 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 3864 924 msedge.exe 84 PID 924 wrote to memory of 1956 924 msedge.exe 85 PID 924 wrote to memory of 1956 924 msedge.exe 85 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86 PID 924 wrote to memory of 3392 924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\085b4d8ed5d750adfefe5db989337023_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb750746f8,0x7ffb75074708,0x7ffb750747182⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13393495362722855218,3020246047980201276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD59b22cf5c3444979a300165a506d5751b
SHA117bcccaffeb78243c6800d9eaea74a7ffb2268c8
SHA256b928135b6c39ca0a5416b76fa26266f594baf242012d363f9ac90173bef81651
SHA512a471f39a23cfc49fb6b6d98a473f2bfefaab38f082f3333b582a4aa929dca5cdc3beec6a9207601b85950a06809d0bb237335ce40b14086c481d4794088e9ba3
-
Filesize
1KB
MD5d4c689ec988ce8443173a21eb259085b
SHA1e215627e72cd56b1ce21d157026ff358d89b7714
SHA256e1faf26a1fd6e63119d0116e3991add3356dcc87a334aecc0398d0873dfdfc58
SHA512828e3083b7cf07300bdc02395fdbe9b4ebacf5c40042d74570d451df1643c0f1fa41263d16362bb248e664981aef4c51a9ed3d5afc28698e2acb0692ba979d2e
-
Filesize
6KB
MD5893c6816d35caef3a44e87a91938b72a
SHA1715d2b4dc3812624cd134fb6cf575ef1476fb675
SHA2569be75db2894f789e79527e4b4a3e208c76f640b04a862c69e7884c789b691305
SHA512b38e357cf795beb0547bd63718cd11f061b5db7223a918f486ffb16d9cbad99f1d03c8f49d5c28e56c2bc85c7447f77a4d122c8d3eedd315e59f8249e2ca8c47
-
Filesize
5KB
MD5e594b0b91aca631e302ad9de077ecc79
SHA1fcf319f9ca2c4995a46a53d49267788ca9fd582d
SHA2565667ada90e28fa44896f1a2c7e13e71fb7142555fe58281bd3528f6d3248567e
SHA51218d81b72ebf091b1b0639fb9f610ecbcefae25e56c8b1ba49f486a44cd214acb574979635e510d4fcb75e621e0de6f323553c9ea308566bcd9d65bb85cbeced2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD501dba795b274c8fd1078e28c71144bfe
SHA127ebc06088c6780fa37def2b86dc750b4e1c31a7
SHA2564e9c648ee302bc1dc924a9629f2afdcfb382671c07eb603e655650ba67d74b73
SHA512b5071e8ca451480291466f92132c165145de600093dd06ecb8245d713bfde5e378cb0730b6620199eb9adc2c5af33ca13afac45b7416f66a59da36d450fb11df