Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
59989e511d1aaf0cda64d1bf9fa79404_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
59989e511d1aaf0cda64d1bf9fa79404_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59989e511d1aaf0cda64d1bf9fa79404_JaffaCakes118.html
-
Size
24KB
-
MD5
59989e511d1aaf0cda64d1bf9fa79404
-
SHA1
0dc7b09cb32ea33d594255373dd5ec1b4329c2a7
-
SHA256
610f04b0cdfbf15fae29ff4ec17fdb10600cfe3db3982a9b743dea7e0cdfc1ec
-
SHA512
fc8e3d3be2427a4e8fd87e12f31a0dbaa8a550aac41f3b7abaa09be566170fbe60f011755b16044c905d7798bf0ecadf7156ab778520cd88c9515bd3c543f8d4
-
SSDEEP
384:Sgic8RnDDkiFrDeusUYfl1rmRlXfi/x1eoLleMdWH3jyLEuUMzC:SgiciDJFrDe2Xa/x1eoL/dcyLEhMzC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 4024 msedge.exe 4024 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 1352 4024 msedge.exe 84 PID 4024 wrote to memory of 1352 4024 msedge.exe 84 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 1828 4024 msedge.exe 85 PID 4024 wrote to memory of 2144 4024 msedge.exe 86 PID 4024 wrote to memory of 2144 4024 msedge.exe 86 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87 PID 4024 wrote to memory of 3164 4024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\59989e511d1aaf0cda64d1bf9fa79404_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff67ed46f8,0x7fff67ed4708,0x7fff67ed47182⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,3360036569955718416,7379160622660797964,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD55c9d4020f657cbd225794faa3393a096
SHA1c85d16d637e837471378411bc1d06dec7fa4f98f
SHA25688bbd42ebcf6ea688de4645948ff38e4e9fbf6afd6d1a8452269b91086651fef
SHA5121f0d5573ffbe4bec0931562d90add9f7ffe332e4d597a78ccad3b8aecd848a72717dcc62dc4110af506fefdf78fba19c71f5d752ed8fd166a434ec5810d08170
-
Filesize
946B
MD5429295b09bab78f743ddc68264cffd7c
SHA1fa172524c0d698b99bb2e94c4ecc3aa9214a6819
SHA2563520f975730f395f080cef159bd96256d81a0d656442e805fb238d1939cbaf7e
SHA51259248542b230e1c0038d1f78672999a3f698258f62586f30736b3b899066d5b70f0f7fe00ef4e80d3f4aa9dbdd3bff74bc5e997b5e86ed87179312e6e654b43f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ee246b4cb5ee8a8fc9a802c7b362314a
SHA1b0a9498b9c08f61cb6ad14e9246edc42207e96d8
SHA25613357ee5b735ca0ac8519778599baf3c7c9c80383baa65eb18490b70e62b6a28
SHA51298fb839c46d46bdb33110c741cf4fb5db78405f891a1ed3983375fbd44638d4b002c9af6c66cdab32dd7b13202ab365f0d25777ec2d672bd3cfa6a781815cc05
-
Filesize
6KB
MD569bed87cad74cacecffc1a29519f8e8a
SHA1e27beee8c2bab47925b475f6cc14ab7baf811253
SHA256d76967c63d828a70947850ecb66b5aade19bb67570a0d30c5024009632589f72
SHA512eae56b47c691af51cf04a63356c4184bebd5136818ee1780fa08b65a0abf5f91895b302df61d19f737fed55cb5860d276c7c253dbe4315e6425ca7a6955c523e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD508ae0e76fc31bc9261343c7239b57c46
SHA1663b22a5138b8e4ee75814564c70f4804efdcaf6
SHA2565b86dfeae24dde3285f34e0ce787942dce06821f0625100a38c0ae0e51e44b50
SHA5124d8eaf0609bc1442d35ed13ab2a26c8d567c55d618eaf14b7809c5a009dbfe7c932c1f2f5eb20a6b216b888e388e32ecb7e974c5ebe236e7231067fb5c2c04d5