Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
4dc91a08f74a263de3b3319118eef5b0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dc91a08f74a263de3b3319118eef5b0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4dc91a08f74a263de3b3319118eef5b0_JaffaCakes118.html
-
Size
57KB
-
MD5
4dc91a08f74a263de3b3319118eef5b0
-
SHA1
1be5d5ddce73c74cb91eb18a317097986d9f6c36
-
SHA256
d3032e8cdfe92a1094922f34666953179640d7bb1eb4db803d9a6ba6d5495b05
-
SHA512
d5c6634690f8a82ecc31d28e44525efaea822d35e34f86f03842168609aad99d7e901945e2c377cf962354b118af260c094c70e3a7f407ade3587700845792e8
-
SSDEEP
1536:gQZBCCOdh0IxCwVOxf/fhf6fCfIfqfUfQfwif0fjfIfXfzfRfRfzfZf0f3fuf1fY:gk2H0IxE3piqQC84IicLw/bpJLBMfWdw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 8 msedge.exe 8 msedge.exe 4832 identity_helper.exe 4832 identity_helper.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 1544 8 msedge.exe 83 PID 8 wrote to memory of 1544 8 msedge.exe 83 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 1848 8 msedge.exe 85 PID 8 wrote to memory of 4944 8 msedge.exe 86 PID 8 wrote to memory of 4944 8 msedge.exe 86 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87 PID 8 wrote to memory of 3064 8 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4dc91a08f74a263de3b3319118eef5b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e3b646f8,0x7ff9e3b64708,0x7ff9e3b647182⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4368 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1498616417526526355,4949471980382840214,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD56e76a6e68e343790e602ae113cdc89fa
SHA1092bd96bc085f12b1e766d84d3598af19ccbd0d2
SHA2569d6acc797b4fc1926ac7d2aa468735125bc68b04dc61f54abb9b0f7aa71b6109
SHA512ae626042b54a2197cac1e28db003449fb2e5a9cdb71704bfc9a1a6bb60647ea12ca181777522d65d2ddbc53a56cece81cb7ee0aefdfd6e34fd8b7bf6fb198354
-
Filesize
1KB
MD5c3d75d9b8d83101fe20781b25e40b47e
SHA1ce66f875e730d5374e635909a416da7e109c44dc
SHA2564c29edd10f6e917b1c8940051ae0adf9432e6fe34858c8ccff37f49dbbacfd3b
SHA51200f0b2a86fb1e628bd4e409de31ae1226a8b7a17109637975f1db5529a76d6747cf4092d920e05b24f32a0fcb6675dc28ddd2cb457193d51d4e5b87db43f3105
-
Filesize
6KB
MD56ddb5be96546288dfc0ef03682de5545
SHA1437a297ca1c4dc26717d3681e1a95d9b3f784c10
SHA2561a142409d4c0ba2c646483d13d2a6efbe3a903b31c7f8383151fab51fc6bb70e
SHA512d6f5ff22d7c3b21c4f24dd3a3e797f78fe9f77122b5d0c4af2263e1e7628b8ce70ad296499e19e267e80ac8d9ead0d4f76202a457a7a8c66a020890d3dc7480d
-
Filesize
6KB
MD53a3fe27b932aa37e74fdb12fc57dbd4f
SHA1b6d514cb65a93e93a85a1a85ed03ef3e5ff6b96e
SHA256141cd53c20c07f0bfcf84b43586c08ba1aca1c9a01e1f8b73911bafecc85ad17
SHA512caedba14534bd705f358eef8971e59a761b0f440407e89765fea13bb9796bd826d18e222ad1804e9241dc6781cd9bb378a5651fa85cefe3aa5a7df665b5644f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD507249a9cf58f82e87154d88958814f32
SHA1943fb09ca17184e63a6f61d7298176c5088968de
SHA25653f2e36bdd576ca1bfb8f36fe6eff100d4b3aaa58511b41da16fa101d1e5be49
SHA512b2f67df53426bf4ea98532237a5032a691b59d427edd60eb88263f0da742a4a47ae343960cb9ff41f5f8d548d1bcc36743062f0fae7b96813d1beacb6f1a635f