Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
-
Size
57KB
-
MD5
615124ad4d29cb595ff387f2de7c49b4
-
SHA1
9af95bb021537a50cc122ba3b5716ef13427233b
-
SHA256
d8023d78dbd1877567f7b042e22d9754065fb942dd74b683a0d2edf6886762ec
-
SHA512
5eaa439fffe96fc831b6ebe6705ce8fa250ff0aebabec034d11ddf39318eb0a79218bfc7c53a92c9495b9d6d1b2ee791a68901c52c31a6f9ca888e12020d644a
-
SSDEEP
1536:gQZBCCOd30IxCX3UrfNfuf8fDOpfmfWfJfifmflfPfFfMf4fefMf/mfuf6ftzf6c:gk2p0IxnlGkbOpOuBae93N0A2E2myFzX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 2848 msedge.exe 2848 msedge.exe 1188 identity_helper.exe 1188 identity_helper.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 384 2848 msedge.exe 84 PID 2848 wrote to memory of 384 2848 msedge.exe 84 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 2720 2848 msedge.exe 85 PID 2848 wrote to memory of 5048 2848 msedge.exe 86 PID 2848 wrote to memory of 5048 2848 msedge.exe 86 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87 PID 2848 wrote to memory of 860 2848 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97c5c46f8,0x7ff97c5c4708,0x7ff97c5c47182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16453927421188737852,16112542041084126494,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD555bef025904eba33faa0932ce0796411
SHA152bad03bc435284bcfa55b6cef61a93b355f2101
SHA2567b2c03e6a7fb5dcd4944ddaca549ccaf50dabc00d09c42992432ddbc747ae276
SHA512dc3451287f968d3f6b56afbd8fd529ea5e212cbeb2858083da9035fa44c4bd2ddfbd66d206c00975bbfd31688d5c4d20c3a482fb84e6c4ed247010d7dcbcb106
-
Filesize
1KB
MD508a066cf30d7b5f437e9c784537f2b0d
SHA1ccf47042a8a620216329ee5b5854895b4d1a2fc7
SHA2568896239a7aaed8636ba2e3a1a255b505892d688ce155556e4e786f644316d5ea
SHA5125c42b04323d8867f87891169251de9694b7ce46e6fee5130cb4d3bdd5bff4d0311ad1b9fc03ef17978be6cac9c4bd636a4a0e53c5291e2ce966b1803f82806fa
-
Filesize
5KB
MD54f6c133c94fff4fa5fc7cad14cf949d0
SHA129da0b0fe50e605a2153be94dd7c87d54813a98c
SHA2567cf7971f3a3acd7290f7700fdabe49f97b1894bdd1c8e752bf671d430d4d5911
SHA512ffe15de2afa53888d35f8e0f1cdf39bd369372be6e9b9e82d1621c5535f28d6fdf764b9dada23a05b5e101b31ac0efb652d945af60266b92b632fe2893645d13
-
Filesize
6KB
MD5631bb30a951eebdd49b20cb1cf293eeb
SHA19a7418574608a9c9795b0f89280d5a86577d66e0
SHA2565b94e437304000601672aa5526a2fc3af2f05f38881bc0956b0b8ed7466d4b40
SHA5125c8dd70c404ad82edf6abc567adf80b27be629211b993dbc08154cdc04444807af2888c13b569a6854fc4fd56df30c66221471b60d930d463326d392efb2d8a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59ff39d89c774b747f2268eee2ac37ee3
SHA1181514810b422616e38eada10bfe19223057cf82
SHA2568bb5a5b986cad62fa34313735ebf5c1b2fa3b954eeec2234f269cf5fad3cacb2
SHA5120e36526232cd0f19b7347841b309c34bbb7f82ee21e5a326f4cd3a7d135f79737f66eba1ca4b32fa946b5a6ad8a32958d510ba5ea3bd9501b0ad97b0ee69c0aa