Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
4199ce27e6245d2ffa50b2040c17d94c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4199ce27e6245d2ffa50b2040c17d94c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4199ce27e6245d2ffa50b2040c17d94c_JaffaCakes118.html
-
Size
109KB
-
MD5
4199ce27e6245d2ffa50b2040c17d94c
-
SHA1
9b036b8db5585470ea2d9a82b802d8e139916746
-
SHA256
d890ff29baf507fdd0d81effc059b24a7a1ec84f5bbcba9efa37512e59eba2b0
-
SHA512
292a2dee46587840392ecac9fd96490acbe04877554c57d808f247c4ea42e31b4a9709cb17839c885d4b207c02e185da1e81f8ddf6d33f5f677be2d3d855ac78
-
SSDEEP
1536:SLnsRg16AoqK6O+OfIhf05xeQwbID2dh4dhGiiD:SbD16AoqKrIx0WQHD2dad4iiD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4360 msedge.exe 4360 msedge.exe 696 identity_helper.exe 696 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 2136 4360 msedge.exe 83 PID 4360 wrote to memory of 2136 4360 msedge.exe 83 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4296 4360 msedge.exe 84 PID 4360 wrote to memory of 4580 4360 msedge.exe 85 PID 4360 wrote to memory of 4580 4360 msedge.exe 85 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86 PID 4360 wrote to memory of 872 4360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4199ce27e6245d2ffa50b2040c17d94c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f5e546f8,0x7ff8f5e54708,0x7ff8f5e547182⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13868673025274661290,6512313318996688084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d5be0751900226d7454066d695f2c8cf
SHA115a48f6f54f367e6c1c07df83bf7ef73bb503cb1
SHA256e37621b8e7128f6cdef71bffafe4d01a55248ee61d81d1de0cc90a061317ee9a
SHA5127b9ff059abd7af159cf45aeb6634af1de995ea52b6554549013dcee8de0234f3c910d4d694c583358ba14c1388a071c97d795b4272dad038b816dfdea43d92fa
-
Filesize
2KB
MD53d4d1db543f02215d74638e6993f6853
SHA1cdf747a442b146208a893dee942267d9a46965b5
SHA256c79a4957ecd8dbf4b226c3ad791a1c7076d55547b090287f5a2cc7212fec3a9f
SHA51293a320d79b49ff81dc0990095858755e74e9227b0af0aa2b95d614c9e6bcc4e0931d40a560ec1e067dc5712b9f865097f11f8cea3474cbedf7bcebc987f609f0
-
Filesize
2KB
MD5bacd58566b00aaebb722e271836f2b6f
SHA1464a9cb57073ca0cbb97df3f7cfd1990b5295d2c
SHA256034079075b8ceed56602e0192ce93ebf40f2eb1a43f901aeb9a31be67cea4c87
SHA512a83c182ac54ebb58fc88f6d837f5a6ad4546c045c8db89366933dce9c03675aaf04f3137d73fd2f602aae1ce146d28853372a18e0568cc933543a4515bd6790a
-
Filesize
6KB
MD59cf4a5614a8ed22692bed9ed423f84dc
SHA117836f0d30c1718c3dd30f7596d2b2eeefd2bfd1
SHA256d3413584d6b5d3cc52a51077247f9624fdaf19977645cccedb7a50231aab614d
SHA512c0e0100738a402cfd8c677c12cd868e78ea687d33765eae536e380b865490a0797783de518761f0feff31ecf11c2cd802c023b253275b2988ec17aa76d4c04ec
-
Filesize
7KB
MD564bf0c379ce6d00d10fb6d71cc121eab
SHA1a00b09f34e99894adce8b8346d33c18eeeb66990
SHA2565708190faa385458f572e6e5e09b70171864c2172b6ba79e84561179c6d3e409
SHA5121ce15df67f421647e2df83b5e07e387758e8057733d091f2c4bb67bb06fe35748df312893b6c0a78cf6119b787102768746970fe6c58baafc15c2974347f52f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a5e82b214a94f0ec2989327c06121bf
SHA19f8abbf09a9f424a3610b4880351bf9501c93ba4
SHA256f392097a11b41ea3ad73fb0549469df3ba670958836e1b732c6a058402647550
SHA512a95c579a55c13c052ab73eee8d240e492c971547ae381b72c2200f132d3e488fcbd97590480428e940107d804baffc9d8a7106d251598e48b73b226e7090b91b