Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html
-
Size
58KB
-
MD5
7892ccd9aef6980e47d54867a84c6ca4
-
SHA1
63c6afa9761d1ac5352dc77fab1793f8ac59c3cc
-
SHA256
ca3f810330c087b1ca2987f1d73bde754e01c30141797ef59cbdef680a964f54
-
SHA512
ef43fedbfb6ff1b17e9e3bfe32f5e960bc9d106fed21aab0d24abf477316320fa2693abd20a76352cd66e35f49b3ade23989c51bbbef413a918fb082aa804b85
-
SSDEEP
1536:gQZBCCOdvUpl6bqYEc0OWbcTepRY38Q0OZ0IxCYz6KrV8hMPY88TNurs811mfGfP:gk2hUpl6bqYEc0OWbcTepRY38Q0OZ0I/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 4676 msedge.exe 4676 msedge.exe 2164 identity_helper.exe 2164 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1052 4676 msedge.exe 83 PID 4676 wrote to memory of 1052 4676 msedge.exe 83 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 584 4676 msedge.exe 84 PID 4676 wrote to memory of 2836 4676 msedge.exe 85 PID 4676 wrote to memory of 2836 4676 msedge.exe 85 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86 PID 4676 wrote to memory of 636 4676 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7892ccd9aef6980e47d54867a84c6ca4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff924a346f8,0x7ff924a34708,0x7ff924a347182⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9976370859187760836,13737733170326544770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5f113634b6457fe9b32958a29fde774b1
SHA167879d4e0904d13980bb5736c77989bb0620c872
SHA256d780c70bde8bec670473b229868c56d86669f44dfab4deed6007a145a5d1e87e
SHA512f472a12724eaf564520e33c3e67e5a2ebeb933b3bc99e2ac1d430c07f49eddcff7cdd5a9fe9a33e94b3aee7675c53ee5112839dae5c44c835b18fd0292947ed9
-
Filesize
1KB
MD5edae59de07f08cd240d154a2b234b290
SHA1178320f48824a96ecc533ac390839167757cf177
SHA2563cb7d5e1a6a29d919a5f3c8cf96b45de6b1995742369aa36c865bcd4357e2b47
SHA5129fb96673d955b056da993b546b6122aff0d85c38492e4c5cc7c9c216688af667eee7238965f4cacb18ca318f3055c30909cf30885804a3445388c43e06bec465
-
Filesize
5KB
MD5418c0e348e2bbe5489c30c4a3570406a
SHA1b294c44cf4e5eed06005a43f6cefe3f4ed728019
SHA256e935f8ecd8d8f5ffda35172856b281362b86561daf0a7ce22ba23d1d0b4493e5
SHA5123d661ae0ec02899d7f666adb56b1482cecbefdfc58743a39521afd1f1fd180847815e707a11cdede7f1553017f1fc11b63229c25c2e6472ad5fc3ec901c3813e
-
Filesize
6KB
MD5354f9041649a237ecc65a89d9f073999
SHA1bbf2347b2a5c540c4a1503c62749312f6217153b
SHA256d827265df71aa25254685ec43e38cef3dfa0bf20948ea24571a956a87c3a2c8c
SHA5124e98203587881c56d327a5782cd894b7292548ed4c83a9bcc3b0e8c45666e9b33db30eb1255e73c6efc4fe52a4493a46fcd4dbaff8f4eba3cfdd71685530e37a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5967be771bdbb61fac3473d3667879626
SHA1dfc324864997c499a8d397dda430d314412c3cec
SHA2564360d7385063823e148f77e95c1355b804be7000536dc1285d924eb5403702b1
SHA51222a2fd56dbfbf6b530cd2638c8984684e53069ed85f410a32b33dd9d749eb4d0ebf7c606374bcc39309da95b0fb0e39d753ce0566e37b5e34b0de8d66d5d8603