Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
496fa0430be640f855f81380208da9ef_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
496fa0430be640f855f81380208da9ef_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
496fa0430be640f855f81380208da9ef_JaffaCakes118.html
-
Size
17KB
-
MD5
496fa0430be640f855f81380208da9ef
-
SHA1
ad0a5d46b26007d3deedefcab44eb96b3c75e13e
-
SHA256
14b05cc67a4af7f7ef796fe58f05e37577b4ebfdd7c3d3e4aa933ceda29051b2
-
SHA512
1e429789be0f7635a082719c26edb7ba806a6cbb2d8528d5c01b0d88effc4084058a6eb959c1b52f90494974905afd82115f0da67930180acd6a294ae9874af9
-
SSDEEP
384:X9/OgEcaKU6m0npHS2ODe1XP/zgZjrxcj37AxyRiZm++t09a2V:IcC90n4qzcrxaPRQh+69
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 2436 msedge.exe 2436 msedge.exe 816 identity_helper.exe 816 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4456 2436 msedge.exe 83 PID 2436 wrote to memory of 4456 2436 msedge.exe 83 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 3088 2436 msedge.exe 84 PID 2436 wrote to memory of 1144 2436 msedge.exe 85 PID 2436 wrote to memory of 1144 2436 msedge.exe 85 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86 PID 2436 wrote to memory of 3400 2436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\496fa0430be640f855f81380208da9ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc43046f8,0x7ffcc4304708,0x7ffcc43047182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16686281672476248190,12199832359287874831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD50ea688883a02e7f866762e8dc577a7da
SHA1f2ed6b226b79799be85a2d3c7c5cb3a3e7adc4f4
SHA256e93db17de55921e60ade786f18b09e3847ea1184f31b10673f77d0173f2a47eb
SHA512dc650cb74ce7875ff59399a58717fdc9bd4540a6b5c456f9c5ad1d8c37d11212e330ceb2aac9b7e9d004a3b76125e3f70bbe2822cc7619449e476680a11af945
-
Filesize
1KB
MD57a73036e8e285df917618aecb9260811
SHA1571461e16485d05b8705bb9c84a2f1a5dceafd67
SHA2566e6422245dcfdb36a9e9d8d7fac9b11e1c8e88a8f3097957717d66f81d0cbbbf
SHA512a3685304a56754d1d70f991e7635a03e21007aa580776cc406cb469572ce3cd65434a7dbc1bfacad080304a4d6d650aa488dbfb3073505985cf0ec271db9ac18
-
Filesize
6KB
MD5fca261edc2bfcbf3ee724029a7b17cf4
SHA1828bdbdcd67730550a2e02f7e877ee8d207369dc
SHA256904d9282d602a83c6c371b1f9b7e6a9ae39e7937fd626dd78c4f8fa858aad1e5
SHA512dce063e556a49c17635dfd26b388dbbe9ce500739e393245f302823b0c8bd8a369829c7f30d27676005237b44037a87c9b14a6612ba786859b4e7d02fb8e5075
-
Filesize
7KB
MD51de3210b25a43593c8eb18c3b17d4411
SHA10f9acb7f20504d9cf2e6f9e374ef15a6d77623f9
SHA256b936927a5cbf47f1850420e054a364c29148c2b63c6714a4bfad7d7495cfb5b3
SHA512e1ba83b4385222cd32ee3924116085c3348a99ea5150d1ac55ffc8e81d69675597be5b0adf90b1d51c52b9f5a126ec5c3dc666d07639d8fe775183caddc819e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9d659fee56f071440eff4fe77fa6e1b
SHA175ef4246d6b344187c28b8421c0d67421924f51d
SHA256b561086b19d08ded92b1df299f38b3c5547e2fcdc3cd63cf74fe1d910a6d582d
SHA5124011d4940c7afa449c5320e2f40db8669e38ae5f190c2c896611fcb720fc0a398251db4f86c49d19dd67be7f9b0300a0c48d3b4746243ed5c2a88b8d32ffad47