Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
763c84c2a4bd9275f602392e754e162d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
763c84c2a4bd9275f602392e754e162d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
763c84c2a4bd9275f602392e754e162d_JaffaCakes118.html
-
Size
17KB
-
MD5
763c84c2a4bd9275f602392e754e162d
-
SHA1
9fe78120310d5582b9b79eedea3eccb0ad58a93e
-
SHA256
d4a8c27f5f72c467f5283e81469e6c529ea0a4361d6c6e7e015c7df13cb83996
-
SHA512
e5bc558acd84eb62abfe73e5c8f7b11e6de25b3c0156ec5a3bf9dd405235e05a6234744481ce3ebdf899d6b3c73dedbdde3669298bcd7d17900deb713aeeec6d
-
SSDEEP
384:7aYWyEjl90UnS+eoCzLJv3IK8HSv/02bYK8fqAA:7aYWvj7njeoCXZtvLYKoqAA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 4180 msedge.exe 4180 msedge.exe 1304 identity_helper.exe 1304 identity_helper.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3104 4180 msedge.exe 84 PID 4180 wrote to memory of 3104 4180 msedge.exe 84 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 1164 4180 msedge.exe 85 PID 4180 wrote to memory of 380 4180 msedge.exe 86 PID 4180 wrote to memory of 380 4180 msedge.exe 86 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87 PID 4180 wrote to memory of 1396 4180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\763c84c2a4bd9275f602392e754e162d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd29cf46f8,0x7ffd29cf4708,0x7ffd29cf47182⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7727669965477031243,3428880428211218302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a066bc30fbd2dc52628f5b0d5a91f792
SHA1cd76891c57a0c0fc4b9fdcbdafb26d346f2c6c07
SHA2565445d011708320f2810e7b8a5e40ccdacfa42c9c3f96a7c9a5572ec094ce45c9
SHA512faf9001949b1ca3eb838d577c5f9f20cd628c44221588a5373dfcb70aa1545eb64236bf5a7696d49ff7dd480756f8384e06e4aaf0bbf5411ec0ec3e635588702
-
Filesize
2KB
MD5fada7969c23cd40e5f7f27d907f74aef
SHA10fd63d77d1098206d2233103f37812d65ab610b4
SHA256fbd30e4540a128c42c1b7e8f8556027df614626b270437192232ea153b5a369d
SHA5122122cb8cd363570d4a73a2461a4fbbce95077c8082be36e639c6611edcba9ad69b61b35665c537079645c8d696194d31efd9ffbe073e93b6e205f5647e64026c
-
Filesize
2KB
MD54bc74b79d74baabd5583f1b515913dc2
SHA1bd1f4657306b8c98f5cf8bd708481794740401da
SHA256bb8a67380a671b3227dba2968b95c637ca559c74e40eaa87cbb69353e16b0e4a
SHA512b3ef408030cffb5a912740fde3bb8f6214e4df8df9529eafd636e39d71e8dc1f3fdf43407e452bc74d28aa84507a2d0dbdf0c8630d4f72dec28a19dcf264130c
-
Filesize
5KB
MD51b4f99faa77257ae511540839daffaae
SHA104fb448c83724b1d7ccc6a2b799b3ac3718a489b
SHA256bdbd290c5ed4648f4db2569917da5253b0680e46f013f233faf8bfad379cdc27
SHA512ee27edb2c21b9d107e8d6eafaf2cc638b2b54b6ac8fd7190e85e3c12c2556a1bb8cc567711f7937557b3652207f72de3290cbf96f8970bd7c46caa40f0c2ab62
-
Filesize
8KB
MD532223bf4377d8f3be82b51ff7c1cf695
SHA138803fb0d567703a3e511752d42ea2cf17579d58
SHA25694b729e54ecd4209869fa51aa767dfae32bfdad03b43189a395b408954fd9713
SHA51236a00ce3a192f6fe1bb4b936eb65184d8f79a436e9164cc40515927f06aae82dd2ee53af4c806054eb36e3ad5058f0b87ed35f5e0447ad9bb9c3747315678d16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5849aa282bdb9cf51dedaf529760e294e
SHA1e375a3e6eae00f4f02385e3fc19da758ce67353a
SHA256edc7faf3cb682fa995719e5cf4763934c8f9e9afa18697b04e208fc4bad2a60f
SHA512982e03a9bbb1750c9aafec49d3c6e4ab840eec4e12b2bad6bde1b9a0209197e525011373587a97c910431400d675d3ef6b56aa308dc185217c14d9b27bbd40be