Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40265e82e577e318444858d5a1f4e313_JaffaCakes118.html
-
Size
58KB
-
MD5
40265e82e577e318444858d5a1f4e313
-
SHA1
856cf941013b7d808b4f1eab7da464e31221c7dd
-
SHA256
49db59d36c420967bbf68b0d4e781165ef4f1d1815cd84b8490468848f45c9a9
-
SHA512
1bef247377cdc1823e53b83b96bdce8162c1b509d1c7c9de3f10fe74a94895c8d6ffbcc3e5a7cba81b68dd86313e932bfa54b415bb8af82926dc438a4b0351af
-
SSDEEP
1536:gQZBCCOdj0IxCU5wXflfUfGftf4fRfJf8fEfHfCfmfffbfrfvfrfkfrfC6fEfBfA:gk2V0IxSts+lgZBU8fq+HDTHzMTlspFO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3472 msedge.exe 3472 msedge.exe 3604 identity_helper.exe 3604 identity_helper.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4468 3472 msedge.exe 83 PID 3472 wrote to memory of 4468 3472 msedge.exe 83 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 4452 3472 msedge.exe 84 PID 3472 wrote to memory of 3968 3472 msedge.exe 85 PID 3472 wrote to memory of 3968 3472 msedge.exe 85 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86 PID 3472 wrote to memory of 2456 3472 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40265e82e577e318444858d5a1f4e313_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8bef46f8,0x7ffe8bef4708,0x7ffe8bef47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13470368294848852207,7797549178669161087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD566aeb9f815638c81b05f42928d5261dd
SHA16a8b1fc78fe804f7de9e849ec37c1447e6113ed0
SHA25660cfc9f3345946f628036a5d8cdedbf9a01376fb7aeb257aeebc9d7ab9c18ac6
SHA5126becbddac4177aba6ec54ea9448763068adcb789fa4ca217e021fe159b9528dcf5bcdd9348685d18f8a2ce3e50fa58ecf37dba1fba77e91bfb72a3f5f3a509af
-
Filesize
1KB
MD5250ba266f4109a8b043875defd2668e1
SHA145ca05d4d99448bf7fc6a90d1bf6f52c97b9b715
SHA256a973713ca73ba115af4cead9e455deccb9afd559c5cf586bde77b7134edd053a
SHA512838e90f42e1e7727ca2d1b6036b8cdfc0aa19652fc14eacb6dda04ac39bcce81161f1bc0c8cf6f12cd214d719cb1d2c767d862531af95640ec542080a239ba06
-
Filesize
6KB
MD519a3c1b2aa1cd7ad4a3d00f5cf903132
SHA145418c57f2397e0e652a2f020e474bead4294542
SHA256be6596977fddbeff55fe529dcc13937cf1d77ca80f1306ee9763e3e6ca2bc185
SHA512b3e343f676b60cd875730fd36f9d872d61905e86293c0180f13b299ad35be629cce77e321b6af81a85b0b5bb289769ee6e8a4382de3d850342b65749bdc90ab7
-
Filesize
6KB
MD5861db9b97209f23c4452081e784ce0ec
SHA1517fd98e16e9c5a094ad123f7f9e49298c04d988
SHA256e14aa1f203f1340de27b95e433313b22c14910ec3c231eff4e0d5c0d82841f5f
SHA512e8208e771bff9c17b1b7bcc159b0c0f54cc76390d3a9aaa3a926aec821458740e5ec55c77e4b012743d1d70e1cb4dc6417e1cc12a793b7266a8e93f201b7806c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5499a211687c4747affc56d89a5855276
SHA15b70bb99e7bff8633edeb98f6d3bddb124bc6525
SHA2561df4e09ccd8ced0c91ff15e06f35b7b652bd32f07ab98fa3b6ea8e0937630c8f
SHA51270f3dc894ec83cefb9427bbfb8dfe25d269118030b5da11734c526d89276ded5821722cb82204eeff932f3ce52b782dba6a81b52e142b09fac3c30e1b4f9708c