Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
6a51ad4224c390628535f7e9a0597820_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a51ad4224c390628535f7e9a0597820_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a51ad4224c390628535f7e9a0597820_JaffaCakes118.html
-
Size
62KB
-
MD5
6a51ad4224c390628535f7e9a0597820
-
SHA1
1cb071be6b21f8cb84057a23f5b1f78e5169b124
-
SHA256
10e5b4d4786afacf6112715817e62a3b2c977abc017f78675af27415f863d9d9
-
SHA512
97d9a7ecfaabadd57971ff3c44b94c8362dc58cb18f83fd1f23d71c1535365f59f8b90d5f36c5657970dd0ec8acd3c7cb68e66dee3aaa53968010d017229d19d
-
SSDEEP
1536:geWrkEEfifseqIvcYgSzKQAI5C2OBY55NzTDAAkFCfV9fGuqu0HFH599gmELk1c1:BWrkESifs1IvcYaI/+Y55N7AAkFCfV9t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 800 msedge.exe 800 msedge.exe 3388 identity_helper.exe 3388 identity_helper.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 800 wrote to memory of 2888 800 msedge.exe 84 PID 800 wrote to memory of 2888 800 msedge.exe 84 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 1800 800 msedge.exe 85 PID 800 wrote to memory of 4404 800 msedge.exe 86 PID 800 wrote to memory of 4404 800 msedge.exe 86 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87 PID 800 wrote to memory of 4828 800 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a51ad4224c390628535f7e9a0597820_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa43b446f8,0x7ffa43b44708,0x7ffa43b447182⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1296481312384994323,2470900701371554894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5dc6e459560fc469410e801aae763bf0c
SHA173c344252dc41cd7875605f55e2fac3b50ec75d0
SHA25606e6edc94d4869c529f7dbeac108b0d3e183e1003d158cdb9ac17767b920e532
SHA512ffa5ad2c84a76455163fba0e63e5e494a6dd4fc73473254f65eebce48ec2b91c037fbb42b18f75ca4d4ab27687f8d3684372115bb8da337297c2aceb4e5d8659
-
Filesize
835B
MD55e63921d2cdc59754b9020f8ec6e17d6
SHA1c8f70becc6c84bf09e3c21534f38809a8a450555
SHA256cc3e24ba074c251a4fd1b3e59927c1fc6d8f72c5e5be8530ab09e37fc0079e0d
SHA51250ce66c3455d1482fd02de8a976ad44c48e1b7e748993a6b0c0a25a677e082f933201c0ac3b51f81d5e80144a46e37712486457e001a95004bb48db400789573
-
Filesize
5KB
MD52f446f16ed867b1446ad86bc3a45e20c
SHA17339cd108cfd15bba5497d3edc845c30416e590d
SHA2560666fa644b3d4a27f8bab2356bec85a8c7de61b175b5be3ebd05d12c7369c343
SHA512a924e9098f5303c657bb1ba5f1b37fc003f05c5fd61c79ca5739096d875e034dad5c1a507a611e1b3009ec0e5f8e2f71edd9f2ebd0c6e5946739250f59438814
-
Filesize
6KB
MD50b8d25d701899efec73859dd8a2c1a5e
SHA1f20755ed45cb8e45f98fbea3c0dcd4be0d31c5e8
SHA2563f3d19e20ea8c4d239b8815791d0a38fcdca8ddcdf522940945275aa7b109b6f
SHA5126c5e25ab562926d99698ab6d1e1eefd37adf72f9cf877323a7dbdd91f130e51a300cf687a4772fc20a323684f46ea8b56ef4f6b195703fbe8b7b5c0abc884c21
-
Filesize
6KB
MD5452e792593cd40f5faaf2638b261df6c
SHA1f1dbb31cb38477a070d599badfd750b51d1c8045
SHA256d757329808d4f99f27ca45ca5f353f284db7b06fd22d7b0c8a189ac1bfaf9590
SHA512c44893daa077b27eb4fbff10946adae64f001595ad3dd594182ec123f19cd80b287a2f20e87686b4dfae940ce09b4ae51305e8718a23f29786e64321b1eedc37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c2d7626681e8ec70df9830c1fbd0e1f4
SHA1888729d6e04ccad991027c2ea6ce1c653d3170c3
SHA256d2ef505bd50c9c9cd951baf4f39f19e2b8c873b6eb306b0b6c787a25e1801c05
SHA5129ca2b89bbce8975ef88a38bda2427427aa0f425dc4c5c0cf871a931629d3a7d0002b50164b6bc327e4e340ad94a9ea60ad66aed277fe3d4ae422067fb25aa2ce