Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html
-
Size
77KB
-
MD5
781b835d7bf202823dfcd890b94d0c61
-
SHA1
a4640a47fe8d6a6d589d27d7a5dd626905005b07
-
SHA256
5a59bc0e8c0a7cbf4da0ae5a490ef2e7be4fa317e8cec6fc5bc3ea2b70cdb121
-
SHA512
8523a2b30ddacac2da91fec968cc7246b7f2d5bb4ac5cfa446b58ab09fe0d7869326083c7b11487c338da4382ca9353446ab2fda721c6209b9a00d8356fc20b3
-
SSDEEP
768:Zcd9QZBC7mOdMIhpC5I9nC4ECDhOcyB+Pd:gQZBCCOdR0IxCkSB+Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 4684 msedge.exe 4684 msedge.exe 4200 identity_helper.exe 4200 identity_helper.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1600 4684 msedge.exe 84 PID 4684 wrote to memory of 1600 4684 msedge.exe 84 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 768 4684 msedge.exe 85 PID 4684 wrote to memory of 3624 4684 msedge.exe 86 PID 4684 wrote to memory of 3624 4684 msedge.exe 86 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87 PID 4684 wrote to memory of 1192 4684 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\781b835d7bf202823dfcd890b94d0c61_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e75a46f8,0x7ff9e75a4708,0x7ff9e75a47182⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7056193252709451415,6789802293754509116,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD52c24d607f8ead7cea8abcfc197f0e9eb
SHA1b20928e09d01c9e2ec9b987bc5b6b63de696ee36
SHA2566897f92017c28cabcd6cbdce15e78208e3d190e3f031edf170fc254de4159716
SHA51245876b8a1ade64e158825dc3b41153a5b4d06648b1a64b3f52901840388932e20ab7b8ff51a806533621f190e72c050b20b19c840f38b80d9efccaa415f93bc5
-
Filesize
1KB
MD5776c546bdc02b07f38051e13e9ac1080
SHA1f41e1bb9b80bcdb8248610986a861b90cfa7a71c
SHA256dd243a84b147068d2d5c9510a2f09691913e0fa5c6ef691582063d41a10a656c
SHA512ca4e8f29226676a33c1ecc544768146481481957f524cc3876abe2ffc47a1f47e8a0e684e1c03d695b000ff9161eb0c75c43705cece591e727dc3d88862c6907
-
Filesize
5KB
MD57fbbe6dc0aa39605eb9ea2fac30f07dc
SHA1ae207f4f23c6325f9d476390eb7921759877cf70
SHA256bc3e2b0dd1b7044dbd6f54b177d52f6796d75f8b167352b57cbdeec4c2e7f929
SHA512dded6e27b19f1af81ffebec3bf2c5c25168e3002ba7930432c4cb868c8119bbb5c87d1946e83fe460f6bab78301ba077fd4d5d7c664971adc3a168312a955ff5
-
Filesize
6KB
MD52e674e793f60abb9870a05385a44d0e3
SHA1f3c969a39d44d4331972e8ce449fd65b4fbf7f7d
SHA25698afab4dfb06cbf48d74213add4dca640068b73780571eadd336c8b6c805fb48
SHA5122d269c9b337eb1331d4a3eb4eeed6183a30b711b185f7392cdceb7ce21bf44b80269d666cf78579d16d64aad6f8908dd45e5b44cd13926de7edf4c46018f191a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD535cda3b71aa6654ff4e428ce2bb2ea88
SHA1a55fdf98793f5dc7ddbbae0494998a7b19ee5a5f
SHA256c7077d56321c7c50b6e5993b992698736b1f0488ac221afd2f781b2ef11fa0f1
SHA512db76fb175a5f44db17191e5e028606aaff8573220a5ecfd13fe7be387e2217b9859dd046333d477ec1de412e328f4179d8b43c938a3fb4a9c740236052b80890