Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
-
Size
77KB
-
MD5
32c256122fe0458723148a054d28d39f
-
SHA1
2baf3ccd0966f231e160073341f4c2be27835a17
-
SHA256
d28ce25d94d8cf3cb62c86ad3fef23ccd7e1c0a4f5790ad62a2f554ad6c5e424
-
SHA512
89ee4b444c0e151bc8f94481697e3f9b2e05e1d873755b4150ffd6dd0da9f37cbcbbade28faf21104e9aa4411ccbe29c20730b4d4f092ef8aef3cddcc7eea80a
-
SSDEEP
768:Zcd9QZBC7mOdM4fpC5I9nC46+TVSci2/Pd:gQZBCCOdn0IxCCy2/Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 736 msedge.exe 736 msedge.exe 4868 msedge.exe 4868 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4524 4868 msedge.exe 81 PID 4868 wrote to memory of 4524 4868 msedge.exe 81 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 4216 4868 msedge.exe 83 PID 4868 wrote to memory of 736 4868 msedge.exe 84 PID 4868 wrote to memory of 736 4868 msedge.exe 84 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85 PID 4868 wrote to memory of 4936 4868 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32c256122fe0458723148a054d28d39f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff545546f8,0x7fff54554708,0x7fff545547182⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2492 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12642643383109130658,18227003488838654944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5a5d4d540c64b4edde0d66bfb4c945453
SHA10d51529599a7f708338cf48c125736016aa92866
SHA256ad142dbb37fda9c363852913570f57e47cd447cd653e6c43af58ebdc44b7f382
SHA51277b79505f6f2ab215592e1153a41f51d78e6382f01c4c218deaa62d114d1660ac1156863cebfcb155351f04a62ad92f4a51a2484bf1458dc39c29e8b61855664
-
Filesize
1KB
MD59dcfce8d8068dcd64579123f7f24ce0c
SHA170bbe245bfdd4e87cec14ccd99705d18e267577a
SHA256860f6bc5ba5978fbbc5620c1adc58147c3c6858b46daac7355006029b0fe19db
SHA512f90149173c027597d8f6c5df9e1b32efd6b9c10b17d25aba181fb8391f5adf2059cf06ee7008dfa8cde947f5ca0a006eb61ee3a2ee821428f3549b50625ee385
-
Filesize
6KB
MD504a4d4bc9536a683ebd368408aeb1ea3
SHA182b08e3091b0efcc52337abbe4bd5614ffad8529
SHA256f3565d74ad26770ead0e86ce2204aa39081ec33b752dd620e57654df36acaa24
SHA5122d6de6f750dee7548d01c1dbc2ea653364f111da1ae8cd194b779dc9faf04c65e46a302300e8347b9eb5c621c0aa72d3e31a81eb78f369b7cbe3389d2d79a4e4
-
Filesize
6KB
MD56dcd64466a8cbe4cfa469a0e36df59e0
SHA1074bb3708f92bff5747925dd9076694d2c4036e5
SHA25685b5f02425eb84583789fda95549858cb1fa32004cfd0cfc6740136b4212e3d1
SHA51249eae5313020b1f7a66215fe9e5f7a9fd9bebe2626f769bf3e320c014976b1d5f4f7fa84b8cccf0f064755bdce8b7d53c53dcf4eb626c3d4268dbe6f5e80b172
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54fe664eed4f9244ff820f62dafe39bda
SHA1d6b6069fbd5406718eb24c9bc053a44cec4b43fe
SHA256868f739cadb30f143bc2cae8fab07da1a553476079c403a7f22d4cf721b9f6d2
SHA512176ff7a7529c341fb4c98a448c98b565caa966492682ef5e1294f8076f3b49d4ca468f593f226f0cd6f30e46e45c0fa4ba6b45f43361a22e84c5999a567a9657