Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
2a10d8e86b0bb2bf3bb8ef9575f758e2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a10d8e86b0bb2bf3bb8ef9575f758e2_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2a10d8e86b0bb2bf3bb8ef9575f758e2_JaffaCakes118.html
-
Size
57KB
-
MD5
2a10d8e86b0bb2bf3bb8ef9575f758e2
-
SHA1
56427a57fdcd56b0deaf04813a7a7b80ac8ea3fb
-
SHA256
158531185c7ab561bff0a98234ec28e2d0d9e751902035feaa8cf31f05c9e281
-
SHA512
e03a9ad8d0a40f9ac5a304faa64e3a8993c86873d26f1abba9d9a5e98648fe1e370e609f1961a928eccbfb70f6ec0aff9a5cbd1e26a690cb5e0a357ae67e9b6f
-
SSDEEP
1536:ijEQvK8OPHdVgto2vgyHJv0owbd6zKD6CDK2RVroTzwpDK2RVy:ijnOPHdVF2vgyHJutDK2RVroTzwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2860 msedge.exe 2860 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 4224 2860 msedge.exe 82 PID 2860 wrote to memory of 4224 2860 msedge.exe 82 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 3980 2860 msedge.exe 83 PID 2860 wrote to memory of 2248 2860 msedge.exe 84 PID 2860 wrote to memory of 2248 2860 msedge.exe 84 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85 PID 2860 wrote to memory of 508 2860 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a10d8e86b0bb2bf3bb8ef9575f758e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa832446f8,0x7ffa83244708,0x7ffa832447182⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14316243075026327277,13717431985655352898,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD54a62e00949b1e111ab71ff4f3f2c35a1
SHA1882c1c6787563af877a13ec04c81eee4b32666bd
SHA25642cd0f63716c089193a834b647ea445abffc3790a7b7b112ea3f8bb898ab1d1e
SHA51231ed79441d6b9c6c97ddff4bc59daa420f3d715532d409e06f7f7fe51e31c5ff74360ae12a1377348de4d44e5b071f9c7014c1902d1569c190d67a69ae50794c
-
Filesize
1KB
MD5354642f2df77c2ec0918d8e9528dbb86
SHA15d903790abdcf422bfda33d214c600c1f7621f4c
SHA256bc946a92d92e4b5f4e6d1154acce5e978c4087d9c8ca4643b3f60e428353c00e
SHA512188543e250ad9ba60ee5a1a9fdac0bc5538ab01882b079e8d0208ef98d81d35eae6749a67365e225ebc20da984368ef8d87e2ad256ed70cf0955be2a06fb377c
-
Filesize
6KB
MD560a8302aea5091c54adc66856bc91d82
SHA126331df88f09a227cf02a7f2713bad37d8f72a75
SHA25606699a77cbd4f504178862dac9a99854eaaa0b960acb625f5c2d20746c387f49
SHA512c722211e45e86520cbc055377e98524fed196b9593a9e993524ed9f885ffe9c81a2c4962a851513e088f66a7cac3061a1dfde80997b0602f7ed8598372fa0852
-
Filesize
6KB
MD51344aa0c40ef4cbbc9df8f4c08965a70
SHA18cf07818f43cc64c8848d2e73734b9394f67ad03
SHA256da9fc57a3d345810e7f870993a880541b9817e02d88e404510a593ffab1fdd30
SHA51281cda49fb3025f433930f1b181a5c235e35016ba1a45b91a6edfa79f9ecfaef099dd90b1771b778de11180f30a44229d823749f759f5b390b1824ea6829daf21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD594899ca0dd0fe8da8c587621f04ec6b1
SHA17571a63cb3468d6e75e7cb32a6c61ef234a2f08b
SHA256008be0811bc112c7aaa60b04eb8b08a0b3ebf2edc1f5d5f03dc44f53239e3e5e
SHA512c9aea0563a5bb4076a739bd7b44ab56152c2046cde07c3c12189c90b74aa05a4ff4c3b8268a750a89e1b9b8175e38558c50c439ef3528bb4b8334e0a8952c61c