Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
-
Size
11KB
-
MD5
2e58a98870ec7fa01db4c8085f66e030
-
SHA1
8c3b980023d60634f543205eede2e3de2ab846fd
-
SHA256
c8f9f3dfd53272391810264da6178525fa18d7041b315310cfd9bf3bff5282c9
-
SHA512
6319f6720d1bf48d372d0fc4dc9f5cabccf2920ffb367384c42a5a8ce73eadad26fc1604411e84bc4ffd6df7c939d7bf052cbf640bb8ea4a56fbb50cd40dd8c1
-
SSDEEP
192:2ValIsr0r57MQxHT8A/w1wvqa1pmuBuLbdU8d:salIcIQQx7/ggpmguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 4684 msedge.exe 4684 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 944 4684 msedge.exe 82 PID 4684 wrote to memory of 944 4684 msedge.exe 82 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 1040 4684 msedge.exe 84 PID 4684 wrote to memory of 3288 4684 msedge.exe 85 PID 4684 wrote to memory of 3288 4684 msedge.exe 85 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86 PID 4684 wrote to memory of 2948 4684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc734f46f8,0x7ffc734f4708,0x7ffc734f47182⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,17682631156803306831,16912447474403354900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5c503e6c4dc850d2611c05af646ba67ef
SHA125c62f726b7f59c60c5fadb05d16856a04928c0a
SHA2569127eca0260e96a0aa1aceff3280bdefa413c9a3b7a90ccac7dac4255d135999
SHA512cd5fa4c7235f230c0a481b22ed3eea4c0c4a4bc500240f1f60b8fb7d6f8f03b4c4cef7246f98a91c1c9baf101f7c51a39c6c05bc39fe07a54245ae23b16d42c9
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD579980e193017fd447f316564ec9193e8
SHA11a9731bfb1cbb83a356891b1958b046cee60841e
SHA2567d70db887e02f05195e6f7489feb41a1a121fcf1ded7db774bed60f5112846d5
SHA5125d3a254ba5cba6c0f9560a16425ade9b880fb52b4bc45b71fa1ebdc40602c80f31be723fdfa9f6693d8f8af4305d378527646943e409b3aeccc0e1d4e971048a
-
Filesize
6KB
MD59d54e7690ba7d7310edb1efde2f4588d
SHA1d30a9655a0dc0adeff1b41c8a2a15765787851fb
SHA256d8daf8bd9653f05470388cfc19177dd47f0b133e226969faad43ea6d34b164a5
SHA5123ef16848c0e338b52b374bc5ffc9e4c68d71e01a9b056d86cb24cdd2331ce8f3ae9625e32a46b5e16ab9fd5f00cf76cd5067ddf7076ae9dd3a7e2b621f367d70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542373cb4de7bb624bc8d5ba7e2d11cd2
SHA1d1dacdaf78268039771fa3db65bebcb7af2c525a
SHA2561ea7f3271a89cffe09fe84039836a109eda69b2b38a82ce935985c73928e6fdd
SHA5120cde8adc61d92c68d7d3bc61edb820358d4275cdd7df2d5cd4f5b556d5b4086f10b22db091fcd97eeefa0bec05a09c2460317981aa7334a1b8d292aa67d3b2cb