Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
74800818866818115dd62ab5c1bf7d29_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74800818866818115dd62ab5c1bf7d29_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
74800818866818115dd62ab5c1bf7d29_JaffaCakes118.html
-
Size
42KB
-
MD5
74800818866818115dd62ab5c1bf7d29
-
SHA1
81d445a4adc35f62fc5897298fd9a67d49e34f69
-
SHA256
491067b15a1dbf00bafa96b4402f8c6b2890e971cf9a48d47f7c4a41c50fefd2
-
SHA512
c010bada7e074f66ae6b5b6050645d0329eaae5431837dcc5e9c49bda01a3e29c2c59a56aea3fdd7f34fa16681acf5bc38a6168a328b1e6be4a8ba24a01e781e
-
SSDEEP
768:Zcd9QZBC7mOdMsnpC5I9nC4zhKzHKQwBwowPenhPd:gQZBCCOdH0IxCEhKuQwBwowGnhPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 448 msedge.exe 448 msedge.exe 1016 msedge.exe 1016 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe 3816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe 1016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 4228 1016 msedge.exe 84 PID 1016 wrote to memory of 4228 1016 msedge.exe 84 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 4968 1016 msedge.exe 85 PID 1016 wrote to memory of 448 1016 msedge.exe 86 PID 1016 wrote to memory of 448 1016 msedge.exe 86 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87 PID 1016 wrote to memory of 4784 1016 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74800818866818115dd62ab5c1bf7d29_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8001546f8,0x7ff800154708,0x7ff8001547182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,17610729903561405026,10130375592506111427,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5dfed473e686cb255f41a1d516fa22a5d
SHA167ea680c5046ca5727287a52f17b44e0f72310ee
SHA25630f46aa5df099fec03bd39e40a6b100c4916c156e6cb1fa03602885f3655f836
SHA5123a174d40f8617f22a3e79f291764005d22a274028ea96fee7646f0d192774f9953581a97ac5d362e86c239b58a152b3c39bb52c99fc927bea4aea08536d7bd16
-
Filesize
1KB
MD5667bed6449ab08c027a996a6f7e044f9
SHA107933bd1bafcc0964215035f1ccfda639c687da7
SHA256bc594c21fd7ed22c17ddc4ca86cd38240781bbb53d7288f6ba44bb3d36b9d63a
SHA5127a84f371e3f5856e056292ae8f6d2163c1b7222fd0c134291f6ad2e95d97dbc0978c150c95344e245a44d2dbfa05408a38c84cfe7bd31a70ee45b6a5bfb22d03
-
Filesize
5KB
MD5f657d3783096ab2d56f6deb75c027275
SHA10fbdddec13868efe7c6e149ed381f2f6802f73a1
SHA256b0bbad7e8c0649c6a19f8bf434ba1253a5c26fe2fdbfd40a71c379a5dd2f9f15
SHA512f3ba69cf7384316e0be7211de5b36949ccebf69c34bc9cc06ea29039febc870ffb93261bf0f8e13eef95828a96234a642b658832894cb76b521a072e17e83636
-
Filesize
6KB
MD5e612b8acec809ceb2b4d671d719d5ffd
SHA1440b22d115cd1291cc51f202b5c30c68b47d897d
SHA256b94e8759a4697e88982a42f6b0d9488eeef2b1e0ceaf69333a70a5bde2e5fbf7
SHA51261ba89bf08199923d8e0070607fca63fd5fe9fffcee6ddaf401995e8b6e440fb0b7e84b6b0c2dca92f6e59b39325fba8ec5dca93608eabd9d978b7806d8bb882
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f0ae255f2f420b785a92411112f85613
SHA114614d8650cabfe11e3f370e74df5d918e1dc2cb
SHA256c57f660a078498e9d46eb3bfd75b5d201da535e0ff126ab0eeae9d8dceeca3e5
SHA5129421dfd1ce34813ed51e725afa2d33e9c714cbfd3600a14734b734d6ba1221be09bed2edb1764ab9b1597a8f59f14531bad6c0f6cddfcee3e335e27d80b8cca2