Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html
-
Size
15KB
-
MD5
5de3bff7d398c66969778c4531d9efc8
-
SHA1
2cb6c77fc38129fbff3ec60723d34d79c7ca2153
-
SHA256
f20967fce5e026a361dfd721c66fa8d3b59b20d3edbfe8e3a2d72c32d5dd825a
-
SHA512
61e0d2a34fcf08cb5d181e97467751c71a0d5707895049e26400179526f397d521e89cf3be3c3a5fb1c3d03269fce7ece7ee86d90b3d4aeb7292632cd7861efe
-
SSDEEP
192:FitfU9NatGTzXW4wzStLwGFfHYlerBVqAGJU5tTN+3hu2gLBdAhUYne8o4C:FiypzXW4w+LwqvYcNcAVkxuJfMne8tC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 3372 msedge.exe 3372 msedge.exe 1312 identity_helper.exe 1312 identity_helper.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3608 3372 msedge.exe 84 PID 3372 wrote to memory of 3608 3372 msedge.exe 84 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 1828 3372 msedge.exe 85 PID 3372 wrote to memory of 2144 3372 msedge.exe 86 PID 3372 wrote to memory of 2144 3372 msedge.exe 86 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87 PID 3372 wrote to memory of 1916 3372 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5de3bff7d398c66969778c4531d9efc8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7fff67ed46f8,0x7fff67ed4708,0x7fff67ed47182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4205310747507099166,8824782872038553148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5a36a8fd08680d1e8ec55e23b607fd00f
SHA1e941dea4238190709e9594045a71f17c97231332
SHA256aa1b4acc720f81de48a0cefbf827467ee8c6176419c4679081207925eb269230
SHA512e4eb4778837bbcefedabe12be9527b80a21448b7b5dc1cab0469043aa18f9e47f4797b28e0ce301074533993b8402c70b935841ad941a9e4eed5088cd4d44aac
-
Filesize
1KB
MD55d9a4e00330ab8e99d391a873ad34240
SHA1f888b2bf8a92ecf312503541af48ec5409d1599f
SHA256ca37e0898ce4c640745da54b362937543eac56407aa46a62978a0ae73a6778a6
SHA51209426e6aae7afa52917aa19b4a2142a73bcb35cb0017b6c19c4874c4213384b6a6d79ed0400276a0ccba03fcd1bd839c6655314c85ca8fda535dcfb87dedaa7b
-
Filesize
5KB
MD5901d383ce335ac16763d939764f34f09
SHA141f91b04b475025a31942f650ef4bdef861bcb80
SHA256dceb7a0eead2e38595a28a58461a1516d0baf205201e70e08831ed73a35b5db0
SHA512e4f991ef03e5826ef098a8e3ef438f2f0e5f2fe38391584aba8d0afd35467e709f847164f2beb148a4bca64fa6a84218d340d2bb3ee16b77b20a22ac80f2a2b4
-
Filesize
6KB
MD5d3a7d5a67eb558100b88c75a588baf1d
SHA1ea2bd6ca8f56df1021e2f89fb835866ca82fdd9e
SHA256d9e81d13d7a7bad768c30fe24bf7d15757308499aa6e0e53a8d0f351e1cb957b
SHA5125ce3e2351d73217017e51232108540bb3254841bbab3a492cbd520c4834a87d8ffb1ca0607d7ed017394584a7b7b1f4874a00565a2ec32c36fa57803844f2e00
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b0cec028eb8f46e17c31d07b88ea2210
SHA163bb45565785ef1c4de3b6e6f6bba043656ef9b5
SHA256eb3298644884f8fdeba8449b54c7ecbcd6995e017d310d6b94f2a9517bb14f10
SHA51255d3f84dfafa6e948f4048f9a95d59eefeae017b7e0fcc43cdd34c658e8f79c10ef8cf9daccf0f6d98929df927eeb3289d7fe8da00701112efa539759e70bab1