Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
4c69b4edc38d01af67070b252bc26a3d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c69b4edc38d01af67070b252bc26a3d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c69b4edc38d01af67070b252bc26a3d_JaffaCakes118.html
-
Size
59KB
-
MD5
4c69b4edc38d01af67070b252bc26a3d
-
SHA1
a139351587d9d51b0173c14f49424a0365d41234
-
SHA256
409494a71dfee5195b3bc37a5ae9a5701fc6ade45dc6eec2ae66343c1218140d
-
SHA512
95ba82e163d026bf3b1f53df417c0302496101e97fc611001f35757d5cb4189a58655da00c9c060982d3c4a28a3bdb8d06db429d94ff5871462503e1c270d4e6
-
SSDEEP
768:i2bOl4JPgG2Ab3AD65qK3sPFL8CplNKJg6PK3wh+2S25:iWPcAbwD65qKcKwwh5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4464 msedge.exe 4464 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1188 4464 msedge.exe 83 PID 4464 wrote to memory of 1188 4464 msedge.exe 83 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 2468 4464 msedge.exe 84 PID 4464 wrote to memory of 4908 4464 msedge.exe 85 PID 4464 wrote to memory of 4908 4464 msedge.exe 85 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86 PID 4464 wrote to memory of 3100 4464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c69b4edc38d01af67070b252bc26a3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcb6f46f8,0x7ffdcb6f4708,0x7ffdcb6f47182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,16427264341773281015,18018691692989197926,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD50c358243feaf6cd7cd2a6c530d1c89cd
SHA109ac201b46fcdff00a81dd7af71066a409c2aa6b
SHA256d4ab02c81c3a6dc31a290148564ac8acb59106fd189950099486f6058d9a3d38
SHA5124efaa107d1aaea05bd1301272538af4f030161620b6bf96731f4e640de236803650f2f95a7fbe6f49077d759e4a5b876c3ec8355cc0eeaa2bb2e69e7c5933d8a
-
Filesize
2KB
MD5551ce3719f2e79bdb6ddf5a225352a43
SHA1e673753620bcfb421f4e4f2cd7105eb748c45b1e
SHA25655e1ea2947546ff090e05bb4515929f311136d62dbc98a298ab74305cf8d5254
SHA51276fa407f646ce024cef421e8cdd8b0f0df61fb05875669966f1e591cccbc71914eaa1677e919e22108ec1668887cf5c26df12d39de7966ef2a604f7c91c82c59
-
Filesize
6KB
MD5f635929405999e00d90ddbe1d2d4f2d7
SHA188da571af15a8c2ce5aac0eb3cc88c4d116fbb6e
SHA256423c83f36ece2b7f2b5601bb0188a5bed595acf151b761cb959dd6c760d25c5c
SHA512a6b7888e6423daa0b17ff669d00e2da7fcea72b5863d8ee59af0e4a0383f8e25ed8d6464600e94da16d76f206f7209ccf2db26af94973342132a841e42de0535
-
Filesize
7KB
MD51ac8a907ad1851a305d8cf76224a9040
SHA110227e18eca8c15ef5325056bdd35d5590bd5604
SHA2560d542d5050209509b93b6f48663194baaf70bf3fbcfe0a32b6fd28d901c266e6
SHA51255c68c984c91ef976578184326c7ccd2a488f8bb084a84dc2ba9aa16f64fb4aa8dbe26a631cb5f02c8592465953885010a912468d0992082813d7a5ac02fe7e7
-
Filesize
7KB
MD55c87a2425fbb98a3b246481807fb9547
SHA12d34aa8c266f398adc7cf432701f4bb68153bfd3
SHA256581c42843063e4c3e612e489bb42931a7be12bbb4e31a021e32053dc9c4127fb
SHA512a870070bf2ba4088d761148ce6e779ff2b6d54e7c0b8ba2b32568ad8448eb93e6360994d7b0c1939720e7cc8012c0272872b196320cde8dcb6aa2629f8118d8c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5689bfb62b2381ba224bf621e8685d893
SHA1024be500eefe48d8b20c97f340608dffd83869ad
SHA25685b35e9591c0ae1e71e9086ad61bfbd5fe6549c73d9ade4f648d27f8986eeb6c
SHA5124c7c25b1f4c0da55f7b0806c47bab13d39122d85ed88cf83f14cb6fd6c2c61399df0b38770fb9bdcf3222988b0a5b321b0a2543f20a6d720b95ba8af9d3db7e3