Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
29c20c43688fa19ab8bf7aab519223e5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29c20c43688fa19ab8bf7aab519223e5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29c20c43688fa19ab8bf7aab519223e5_JaffaCakes118.html
-
Size
57KB
-
MD5
29c20c43688fa19ab8bf7aab519223e5
-
SHA1
6073e0f2fde29a1c3deaccc6a3252dc84a06dc4c
-
SHA256
5babdb1fa74a15294e6b169e6384d222fc04dc54b42b5dd414d5075e93ba745d
-
SHA512
f8ef362c2ea687ce22a4acaa253d02cbcc693a88d501e4b44ecb974b388b505959d15dc8d4f2f25b1552c1b238d16ba6b81250daa43fcff655e2408bccc84951
-
SSDEEP
1536:ijEQvK8OPHdsATo2vgyHJv0owbd6zKD6CDK2RVroxFwpDK2RVy:ijnOPHdsd2vgyHJutDK2RVroxFwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 3992 msedge.exe 3992 msedge.exe 1544 identity_helper.exe 1544 identity_helper.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1856 3992 msedge.exe 82 PID 3992 wrote to memory of 1856 3992 msedge.exe 82 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 880 3992 msedge.exe 84 PID 3992 wrote to memory of 5092 3992 msedge.exe 85 PID 3992 wrote to memory of 5092 3992 msedge.exe 85 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86 PID 3992 wrote to memory of 4296 3992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29c20c43688fa19ab8bf7aab519223e5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff821b446f8,0x7ff821b44708,0x7ff821b447182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,244508698524462326,13125232116404983148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5d796165fc43fb5456e703f4b0f33c1d3
SHA164b0c79a5eac485b7bb2c1c70e88505101fc1c4a
SHA2567686b417ead6e02c17328c90b5341a2d520299464eb930a69c77c20650bdaf31
SHA5120d6236c7116a3fcf1025ef510c94c680713c31217087a5a81cf5c7e59e3c0604d88dfab1922206d295040e7c22689ada7ab99c8221c232dab7c2804e439cae6e
-
Filesize
1KB
MD55a9ae72f6da26c56fe081923d31bf59e
SHA139036bb08ce0ae52066c6c5ce07d21b39de9f431
SHA256fe2c79747192fb581a61c9b7ef2eb07df410aca6c505907682173139e4d88997
SHA51261d7247f9c13d2432a6c7aeb07ec3fbdfcd72e65c32888e2c8d2268fa625291c59f6a083215779bc45701522ce12907c8f9e666cca9275fe5b778ef8a490b8d6
-
Filesize
6KB
MD50c8f7bf2f893851746cdd26b8a927f5b
SHA1e2b2151dfbbe30a30bddbba9018d4f201eb956b3
SHA2569f81113662ed7942afe795fc919be3bbd1a6390f65120137f6ab523f073339c1
SHA5124a181028175830bbd0cd7d392e265b3b8dc28b9e1dc0005a772649f988ca5891b0c00fbfb37d0ffeabb8df23c4660c2b7baf7aa49688dac594ab7908d68276ce
-
Filesize
6KB
MD5e9f1df41b170f96708f7505c351a46e8
SHA1a6ca47c7590baacd6807d9b071a5fb24c4a47252
SHA25656b5d1cdda38713ddbb089a2d567a2dfd025b22539d8053cf1d586b4cc0aa970
SHA5125640250619e865d38f2ead877fd8ecfa7e09522583397b9f04707a436b93e05f9b9094bbd8b93368f76250e05b6b3a638ce9f66a198cf755aaf38e3d6bdf9112
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53def396a9abbe8a4426a30e45aae928f
SHA18b5400f8e6b31adff7bb16cbc343f9a298a60abf
SHA25622651f44e3694064c35a70b33824c509b8a0d3100c3a9a4f6fe246a0765ea9e7
SHA51221269e9b740386febfe48aaa325bfbec842825049f1e21fcbe5d954bda34ca1ab11225427fefef5d524a43f1082c9ff06daf617f890eb61c91fcc7db605d0e45