Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
5faa654cb9d49df777208d7e86b5667e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5faa654cb9d49df777208d7e86b5667e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5faa654cb9d49df777208d7e86b5667e_JaffaCakes118.html
-
Size
57KB
-
MD5
5faa654cb9d49df777208d7e86b5667e
-
SHA1
55917207d1f241d689a92527b4bfe24e9c2bf25e
-
SHA256
913d568bbeb4305945188b52e1958b8c73ca40545ce1536b3bb59b14f64104f2
-
SHA512
029897c30cb811bb1c67f21b45e219e2c32bfbb274af717084d9fefba1d5efa213a752cfe54c28e215be75a2a2303ca5c6afce949509e1b7bd7e7684d89d7357
-
SSDEEP
1536:ijEQvK8OPHdyA3o2vgyHJv0owbd6zKD6CDK2RVrof3wpDK2RVy:ijnOPHdyl2vgyHJutDK2RVrof3wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 408 msedge.exe 408 msedge.exe 3324 identity_helper.exe 3324 identity_helper.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 3152 408 msedge.exe 84 PID 408 wrote to memory of 3152 408 msedge.exe 84 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 1952 408 msedge.exe 85 PID 408 wrote to memory of 2420 408 msedge.exe 86 PID 408 wrote to memory of 2420 408 msedge.exe 86 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87 PID 408 wrote to memory of 656 408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5faa654cb9d49df777208d7e86b5667e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34146f8,0x7ffab3414708,0x7ffab34147182⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6596 /prefetch:12⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16515274147758313094,8320304626877498580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5b16bdf2c05630eb2f14d5ef50b42684b
SHA15c0dc7733dc092006cbeebdd07b1854079c44eb8
SHA256ba76c66c26f9aea16530fb83631b1542a98a745efbadfabe229b3491fa46c945
SHA5128e98f4db87e0b181543522cba9dcb1bbfe9f6a5210aaf7b09b5392ae66e2b2b604547756336be66313382902346bd46fc17b465c06988a058e16238e1aa9893c
-
Filesize
1KB
MD567b6593b65126b811d810acff647eb8b
SHA1acc9621940918a9f4cb09ea960fc5d578008d306
SHA256f7095570aedfb17d94c1fd92937c51b6329e439edbe13f883df3e53880f26014
SHA5125537336c9cf693993468dafb3dc15b38dd6e617841badceb978b68263123980fa479261b564d555eb4cb2bcbb0c85b047579e5eea4105fffe167e7ad325aa259
-
Filesize
6KB
MD530d0fd09c837d183c68e285145cd1057
SHA15c388218333e5e4b70c729d1ead2064e16ae7e8d
SHA2562ec01501f0cdc45510df88ca7c5b76b81f55faca282b35467a9ebfdf57d83271
SHA512ecf02809aa181ef3ede457f65236d1ca55dd80bd19c3364b55444b55fce88c4c72800c4dc3609deffce5d87994e150dc34a0d72f74eb359da2c2a3bf4975ae13
-
Filesize
5KB
MD54b01160e3bf01597f2cd8a0c47a2591f
SHA1b3bf2a8f77ca4119232d5b191caac4153f1d3d0c
SHA256754654b2722a6da6fbdac9d589b5f37230f0ba57f521c67a04b50551330a2d87
SHA512ae5fa4432ab0f8585a7e1be53e589d692e5ee789704b23cb1326d2fdd24eba46c61cf73786d5d0fb414d6e0beb1b0951f146d7574c976ac66eae4993cfe55091
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD569c697f07cfc4b884e5608a0a5306ec8
SHA105a84850fefd0bd2d6355eba343041d53efffaac
SHA2560f58e6978a79301c69b81e05f2251132d0340f4e1e5097c10e53c5d6c2fc622a
SHA512e5e5dd04a6ff27a5756b72cf9b3fa1b61fed3135fa5a669c59ac70467cd81c296ff7817451c74e8548f432e47fc81a632e2eea75d1fe9287769e1b90aca845b1