Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
4308b8a8f4f5b793d713af576ce34157_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4308b8a8f4f5b793d713af576ce34157_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4308b8a8f4f5b793d713af576ce34157_JaffaCakes118.html
-
Size
57KB
-
MD5
4308b8a8f4f5b793d713af576ce34157
-
SHA1
35bfef04db0dc874bae4ba873ff6a19e06f99c82
-
SHA256
9006e63478720d602feaabb0fa7422e093564deb4441bfaa2da8773ed6e40d61
-
SHA512
b56c9bbb3d2974bf7fc6ad84d5ca799350fcf49e50323c60ef1d5ac6b5b07f336672cce7da31a0c4b63d85db55b51662391ffbd1ea27fc1a1a34d9dd456d9bf5
-
SSDEEP
1536:ijEQvK8OPHdsASo2vgyHJv0owbd6zKD6CDK2RVrofjwpDK2RVy:ijnOPHdso2vgyHJutDK2RVrofjwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 708 msedge.exe 708 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 1408 708 msedge.exe 83 PID 708 wrote to memory of 1408 708 msedge.exe 83 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 3476 708 msedge.exe 84 PID 708 wrote to memory of 4752 708 msedge.exe 85 PID 708 wrote to memory of 4752 708 msedge.exe 85 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86 PID 708 wrote to memory of 4648 708 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4308b8a8f4f5b793d713af576ce34157_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8ddb46f8,0x7ffa8ddb4708,0x7ffa8ddb47182⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10817552722305793164,14861998193165192866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5ccad987a293b375420868dd8c2548deb
SHA1e82612335d484c452d9c61c0c86c2a322f6696f4
SHA25615882a42f09d605f811cdcccb1330cc54a187912e47fe24d7c54077a0fa92aa2
SHA512d8d8b9f2f35e707ffbd960231bd4e11e9e6a6bd241e467ed2d03da0fc788f576720df85a812b94427180bb7f4be50b6fe185fe20ac646610a54349a3f622a90a
-
Filesize
1KB
MD567572c7cf3fa4d6d81c9909d3a118c89
SHA11a5216859b2edb1f3b44526ae75b881fdf9efac9
SHA256c77d582d305ba870d9dcee28fdb3a24c3a6ccdeb3f3d7ebd613150c4314d29fd
SHA512aed1e1919ef0c4c2a9858dee84f4c0d5a5bdbff91e4d858d934e2e74ec50ac24578edc75b975ab361c29a8e22d4503809a7cbbcfdfb0dcf952bf06831b484712
-
Filesize
6KB
MD5adca16d833661c3d926e64f6149bc85f
SHA1bcf09eb898a5ee555a7a18c6a0212fdf4669103c
SHA256fc485d22e685aa16df162a768319514456ed166b631918072fc6bd8136c10176
SHA51272b25b54f7aa45e4c40e9e4898100640764ee960eca8fdb11efeb20ffcfead152818d8ec8ccf0cd7e01c7c7804069b59b68140cdc2500f38d61588db506b6dce
-
Filesize
6KB
MD5500844658315389052a1ce51c25e6cee
SHA1477615e15f0d7ed971e2438f9a4a827a62c6c510
SHA256fd7e09d861f6df4af8352e750b5e3aaa01fcb091f59cb7ee036a33f8d729227c
SHA5129e5a29774954e1dfcb613202d43d5e779e5fd6f82ab9f478082b5641a826626480f0607309881a7a09920f7921e4351bc544415581c26878339a4f5bdda808cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5041efbfd2bcca04812cffedc60d6b00a
SHA13c395fbf01f04b06607b5dff7874090961d5b079
SHA2567b2cca1746ba93aafc161387d7f15bbfea25943faef613e6723dfd18ac6206e3
SHA51235c5bb002135d6e8da62a542bf6cf909ec7bf5d6683687e04b2ddf48420afd5f921ce1982689283c1708739e97b68fe7e0711c3cdbef8b3363c25a41d4b7ab51