Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
7500ac5e30261723c65535e78690fc5d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7500ac5e30261723c65535e78690fc5d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7500ac5e30261723c65535e78690fc5d_JaffaCakes118.html
-
Size
114KB
-
MD5
7500ac5e30261723c65535e78690fc5d
-
SHA1
b34bf9da18cab2ba953b80e70fd5e1832e4ff019
-
SHA256
ed047af957b803db0b2e2f1d919c1f7ebb0b0739d04de4949a537fe24db22ae9
-
SHA512
810ed13311d369eee21670cdda2d86b55ed22a3b8a7d34cbf0bae0683ebaac54482c7d228f5b8b1c5a11f58374325d6324463c74812f4f8ba42a52bac7d1ffd8
-
SSDEEP
3072:2eTJM/MIF0skwF1NJ641OEy9T7Oh1XEJA/K67aIqdWXgrIxQWPD5TGYw:FTJMf0sPF1NJ641OEg7Oh1XEeL7aZ0U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3752 msedge.exe 3752 msedge.exe 4368 msedge.exe 4368 msedge.exe 4524 identity_helper.exe 4524 identity_helper.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 668 4368 msedge.exe 84 PID 4368 wrote to memory of 668 4368 msedge.exe 84 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3252 4368 msedge.exe 85 PID 4368 wrote to memory of 3752 4368 msedge.exe 86 PID 4368 wrote to memory of 3752 4368 msedge.exe 86 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87 PID 4368 wrote to memory of 3924 4368 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7500ac5e30261723c65535e78690fc5d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd4fa46f8,0x7ffcd4fa4708,0x7ffcd4fa47182⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6058465331525374067,16212607811669102741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5250ca9c1ca001f9546f5f7adf121c2a6
SHA1ceb503e28d89bb5087f998bea70be3a466ffe954
SHA256a50da9b4e6b46731a51b244852c2c130f220b2403f24daa0a0820bae7829fe60
SHA5120fac88365ddb1759ce6c23ad6ff070166c2e4fda9227864241b8d8e48a4f697e6669751a0c965c3ace878c1df00315ca433bbf56f528fe9a390803d7c2dfce3b
-
Filesize
2KB
MD5e4defeec0eb5e6e6148abefaca8c6603
SHA1bd4b9aef735cef344caa7629d41278461f2cbd4f
SHA256e0ebfc83d24a09cbae767ca21eee0b8e89f62caaa059aafed9fc8b9ea7e8a42f
SHA512898848953203daeb9837747895592ca6c80054006cbab1ed9d2c1cd94905234c0eeb0b74b2bdb1be1320726da98c5a905ec8a42fa7e787efdbced2fdea2f3a1d
-
Filesize
5KB
MD5287c26f4482ecaaf1e69cb0262f57802
SHA1fa30e2cd0fb54e03075d1b3c0776656a17554772
SHA2568de9d2f65a09750ce76bd5b4c2c0ce3c6c7d325dde2021f13b0131704315057b
SHA512b6b393c0d76162e545c0b41f390386798dceca41b7a4f39c2153ac107f81bfba6d58d66b4eeb5b3e5dc7b4a2a8144599ba93f78df5ae9ba0c3a46daf7d18d644
-
Filesize
8KB
MD52b5b687282a1daa95960e4253d34d30d
SHA1ff8791f9c57ded4f4bd2a6b8c3ac8422e8dab64c
SHA256f64f43c59fd8edd8c25d12e77e13f8de56c11395f7b1bf55ccadde3f4dd3ee54
SHA512da55b2610f012750ec69b58871fb867707034c6367c5757d1e0a553717412f033290bb1a8c13972ed8c910e6e7fc0c3603a601c1cbd5fc6cc1f9335f64b0b6c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c31ce13e16ac6d7d7c5eff2aa8fd63d
SHA118c36ed65bbb7c22b8b97a7422ac10be94dbfb1b
SHA25695be36dcc45d7de8f56c07d1f845b1f59b5ecd58e9a519bd3d425d74ec1b31cc
SHA5126cd837c4ff0eecb36a1030dd9d03b9ca80671e3eb2d4965fe9c234bc4b5c9b7de1be37350d72a255673b734532a8d007eebfec5cce30dbf62e1f1de409d0bfee