Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
4bddc2ac9aa6a12b4af4b9661521d623_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bddc2ac9aa6a12b4af4b9661521d623_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4bddc2ac9aa6a12b4af4b9661521d623_JaffaCakes118.html
-
Size
18KB
-
MD5
4bddc2ac9aa6a12b4af4b9661521d623
-
SHA1
bcf52e3cc8990635db06dc067a53fe2a9c539c52
-
SHA256
45f381819605f7ad36dde3a7288aeb1cd97bf860c4f83dbd6c9d1d8c7c08f2f0
-
SHA512
68dfe3d62efc35437315ebc5de635736be12d4b892e3721d8ba20e8dcca21b00a1208b5ac255249b41d73644a6ec8cc9f13cac73c9d176ec9a6d6e1baab5e81a
-
SSDEEP
384:iWcXP+7Acou4xilxDVU8zupkzK2/xghlhTBEYjvgJ2:vc/+69MxZkke5PdjR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 3924 msedge.exe 3924 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 8 3924 msedge.exe 83 PID 3924 wrote to memory of 8 3924 msedge.exe 83 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2116 3924 msedge.exe 84 PID 3924 wrote to memory of 2392 3924 msedge.exe 85 PID 3924 wrote to memory of 2392 3924 msedge.exe 85 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86 PID 3924 wrote to memory of 3092 3924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4bddc2ac9aa6a12b4af4b9661521d623_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff768946f8,0x7fff76894708,0x7fff768947182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9626243336624407401,3026008887166342789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD55a8f1591860e59a338654b627a8fba36
SHA17b91641e5340cc8fd74417cb132571230a0ee172
SHA2567f5ff2e0190e761a23609901eccee270dd2340875edea66668ff708a6db5a993
SHA512a275c92912053ecccef4bb1aeb652cb28fbe7cbb78aae68be752eae2dd4c4e97409723b744ca41612f6402c84a0b11433da9adbc98cbd882c45ce07ce1012fd8
-
Filesize
1KB
MD56cdc5a70440d108161e2efe89d60a5fa
SHA186f52505a54eaeadead9966d1e0acd60ac12345d
SHA256678403744191429f6c4f0dfe2be5338619114ab48b40472e5c347fb68f9084b6
SHA51213cf42f3e7e9df736eb133ff2035b89b3edbac42f70c112a9a79e1a0b64675fc331e4787def6be50372b9c6d9f7efefdb69de8e505e2a611d7855fffed60ac4d
-
Filesize
6KB
MD50e1149a1033f9ee4f901363edf686a19
SHA1c14b43e481b9ecde73815482ead473e544e2538f
SHA256159402542903289e00ea9e8fae2eba3d3d04c6131af3682a5dc244aac791f94c
SHA51289d9409b2ee3573b0ee702deac3d2ba8b35a5dd3141cafef1835ce80e74996326542ad10387d8cb399c528ff3924a894637c1d422810b5b191df787fbbad8dae
-
Filesize
7KB
MD513820c7028dfc2c271c5b64cc8e7dbee
SHA19edf1d7e02c45ab40ca53b1b1a737ec5e6a1e306
SHA25635c92625f81640909791520c801901bc681aaeb559e6125cdf82b73dd21dc251
SHA512140fee28c9e4617316a7d63fd773e9a94a804b29707afe145b3883ae504cc8cbe7c0e78a96e50fada2b1705b7bbd5859751b0a10ece528f660031e9bc9c0c04b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fdee700cad5c6e12d360e5f8ea991e1e
SHA16eebb32ecaa6279511ccf1614b7d94ff89247eda
SHA25616d38dd43d5693cc663abc7fd72c8813dd8c547b5397f1ebd513eb7360445479
SHA512c7b07c13af5576c696c36dca1d7fa1c228cbff34085562f27ddf7538bf43b9078cc597548a8813332964501668e34d065c205fb06420875416a9eea17aeb0b7f