Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
372bec1d5d1376e6a66181ef09654282_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
372bec1d5d1376e6a66181ef09654282_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
372bec1d5d1376e6a66181ef09654282_JaffaCakes118.html
-
Size
57KB
-
MD5
372bec1d5d1376e6a66181ef09654282
-
SHA1
4e248f7f0f09b57305a63cc497991154d6a44492
-
SHA256
598d2442e96bfed90d8c9328e169894d6f8b52a0f4a63ad9484438faddc57f61
-
SHA512
9d66fee6448c99e55366d908ca764f6b1b5457f78ddc87c3e2a1d5460f3acd20a81b6800bb36953fe0686af3f68cc6172901ccef72cda7a36466a82bdecc60ba
-
SSDEEP
1536:gQZBCCOd90IxCfbzhFt1PofBNHmJJlDScVFyuPJya9s18iRgcRD3metiGUWa04UQ:gk2L0IxYhFzPofBNHmJJlDScVFyuPJy4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 1060 msedge.exe 1060 msedge.exe 3260 identity_helper.exe 3260 identity_helper.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 3064 1060 msedge.exe 83 PID 1060 wrote to memory of 3064 1060 msedge.exe 83 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 1856 1060 msedge.exe 85 PID 1060 wrote to memory of 2232 1060 msedge.exe 86 PID 1060 wrote to memory of 2232 1060 msedge.exe 86 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87 PID 1060 wrote to memory of 4828 1060 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\372bec1d5d1376e6a66181ef09654282_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff904346f8,0x7fff90434708,0x7fff904347182⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,7756324489584667854,11737532399447166845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD553eccdbd2f8fa1aeb55eaa1f059903ad
SHA16c12d29de4153eb9e434dc2a42d9cae00279c384
SHA2567b88695ffbbea05336af075c9a9fbe9d29902f05ba6a660f2e0e3f9baac40cd6
SHA5120d2cd00af7d50d4b46703fc4cd3d6cbcb36b5d6fbfe57a96a4f6b7be8d2d58deff0714c31e6140e2efb24f9680cc7fd9ee5e2fba879ffac58a17e2cb827af41d
-
Filesize
1KB
MD585b7dabd273edf3586ee443721327d47
SHA1b0db2c2821fbba7461124d2f6bdc23125e49858d
SHA256ef0401094f5f0c6d65bfef65fa4e818326ab374a0e7577438f39804a14541fba
SHA5125cdf5e382908d3863571d2e5123e44f3db73eb368a816b7932b412817a2aa65a1df787b1409d5ca2735113179e56fc115596a955b74ccd3a9ec560aafcb5d80c
-
Filesize
6KB
MD58cdd5aca3559924945d63e298dc30004
SHA14a537723bb1961f0d691e4a8008ad30e0a4cc54e
SHA2564f21154bcba3acf98744baafd7e746596b0d6079eaf927a65978219debd72aa3
SHA512a87d7b52c697f50e040994e81619f8313de74999f2fbe343821c2e37d0ee8f53d35b1040acf2d4de420ea3ffb9f9161328431a7e2e17d3672d67b27a1aba81bf
-
Filesize
6KB
MD5e1fa298a628c6b090755ee45ce00d31c
SHA12aa6173b13720f8f2657564dd30c787b460020c9
SHA25620197de23ebe7dc5678b3c44bc499b06dbbb189ee621bed974c6d1165fa22762
SHA512dcf028e19690283d3e24bf7d1ec719c595edd95b3d9fc8ae977dd9fc972e6c62c8fb6f55f4def30c60ccb4e29556408f7950be506b9521272603c35b259db185
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD511cd42c3a939989dd367565d870ce5d2
SHA1e5b8e7a42d3fd68c65fe62a73ab3bc93dfdd26d2
SHA256d0700f0b518f9d1986c2ab24efc3b4cf71ca4a76fbc163f7f3ec194e177966bc
SHA512f77475d9e73a1e2759851e032fbf24449c828aea1f64b0c37c6d34440b1c9c8d2f860d5df10352b68328c1c0e2c77bb79c8a17514492c6af5d2c845b1cebf902