Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
-
Size
39KB
-
MD5
841d2bc47cd3ae729b1badd937c39ab4
-
SHA1
f6404054a7ede6c35336e4052cac6ce3d81f777f
-
SHA256
de539c241692aee1e81c0499cb59e05be5dc3f58b2cd693fb37a67df10f7ffdf
-
SHA512
e7c081d598e98aef3d08791048339778eef632d29207fa7d4a07efb82cb7173187c35d72fc86125ee843a5b70d2068ab15dc514f44ad7516cf42f3b37a12d8a3
-
SSDEEP
768:SVUFwev7wN5jM87zDYXKjJRGeovgvX5jLfJASmhhfnPyEwP577Rk6UnlaHRRRuRQ:SVUFwevetzYAR5fvXZ/cldsHRk3nlmDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 5064 msedge.exe 5064 msedge.exe 3616 identity_helper.exe 3616 identity_helper.exe 5380 msedge.exe 5380 msedge.exe 5380 msedge.exe 5380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1912 5064 msedge.exe 84 PID 5064 wrote to memory of 1912 5064 msedge.exe 84 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3112 5064 msedge.exe 85 PID 5064 wrote to memory of 3580 5064 msedge.exe 86 PID 5064 wrote to memory of 3580 5064 msedge.exe 86 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87 PID 5064 wrote to memory of 4384 5064 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e3a546f8,0x7ff8e3a54708,0x7ff8e3a547182⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3387664216665710887,17166932403715221682,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5596cc36b866b68c53025601730336997
SHA1f22826b555a6ce9b11cfebbb8c6b4789440caa43
SHA256aff176bc5be2dddc662cb712cd078ec6335e3ebe0323ba61afb1cc0380c4466d
SHA51212945fee5e57e5c2c215f47f1581082113a0d5a43cb1b677b41593e573cc8fa4c4be3cdc34e880e649b0ccaa16278937f2dc8eea953184ccdb2636a378be9e63
-
Filesize
2KB
MD55e7915c6541e64e42792b52340271ff9
SHA19ea9a88b3abff66c26d27e903a243cb1060fc694
SHA25665e8ddfa9a1153a67893d5043146279274880f910c689004c61de582e0953965
SHA5123fbcb7249f2a3bea699525d680ab79b47c868b124b9e7b998b2da205235da912da618cd7dc1f639e58955f0d924e6d362f0fa2a5201b24ac90e220894c9c2fb7
-
Filesize
6KB
MD5034ac22165555dee1b8d5173b3c8a8ea
SHA1adc45ded75b2f4f5ac714a8a6ab0ece69d3814fc
SHA25653ab555b930715753c5c69e5359ee2fb8d9f81e4fe5a2a00545cd85929750f37
SHA512c019b555144a6d81142ae437944e55c383af4f8a0ebed64be14d97b197194f170d5a5cb98289029d6f35f699d4f986d84474161504b975873cd962e2ec57af24
-
Filesize
7KB
MD5b9ec461cba6fc1ba4d8eaa04fcbae73b
SHA153e3fb3f68198c5f91936267cc81e871391ecc6c
SHA2566a1fc682430b9f293589a5e36127c755cb83171df4a1af86fac52308af3e28db
SHA5128edf45f00089ff022b050417be0f30b672db28ddca3cf57d181749d6aca8fd67ca2c535e1d35069977a3854add43ebcb3d6538baa6487269d7ac251bbbb1e319
-
Filesize
6KB
MD5eeb14d4785ff8bd6e350643a536430ca
SHA1a7831e30152775b1492de13ae07acb95392e4160
SHA25698b6a7dd1af6e586f4c891b08eab8d51570238b6e5af6ffb583dc5d27c796b73
SHA51250d0a42dd5d51185d0eff67108e4a4b98e3de40d9b27ca820f985b2667a156b6d778ea6837a1769b4eea98584ee7772f0dc6a207c28e6a47264f00068eeb66a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5481c978c1fb397d528374b0238e66f65
SHA168e14e557db71defd7049e6b21e3327a57de8956
SHA256a1fab71cd1f79c47fe485c30ea4a77e0a66e0027c31226810e8d7a607a7f9727
SHA51215fd10e725f613bd2cd23cf3838c64fe0953a3e05d0e8138e87d5afa2553ce48be2652958fb5983a2dda6023b24774b76ee3473232f754c43031108c8c75d83f