Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
8bf0e625dd8bf225cd550790c0869106_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8bf0e625dd8bf225cd550790c0869106_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8bf0e625dd8bf225cd550790c0869106_JaffaCakes118.html
-
Size
58KB
-
MD5
8bf0e625dd8bf225cd550790c0869106
-
SHA1
ddf7b29e28ca2d98570bbee92b4e3c02883c953f
-
SHA256
170d2860b82eb28109a06f08b69628ea922c110ae4f135cd84e5012abf41575b
-
SHA512
80bd38b4d75f6e063593238f8b7ff83735eb8b155950494ebca7f303a79223a5d8dff5ec0c90bc5b7eee1eb4f3b1de57eac54d5a76fd364d4e555b5fc7e8b5c9
-
SSDEEP
1536:gQZBCCOdt0IxC3nH+fpfCfefOfcfrfqfYfjfcfQf/fDfbf1fxfmfKfofLIfBf6f2:gk2j0Ix5BqGmkDyALEoHLjt5+Sw05C8/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2872 msedge.exe 2872 msedge.exe 1816 identity_helper.exe 1816 identity_helper.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4660 2872 msedge.exe 84 PID 2872 wrote to memory of 4660 2872 msedge.exe 84 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 4784 2872 msedge.exe 85 PID 2872 wrote to memory of 2820 2872 msedge.exe 86 PID 2872 wrote to memory of 2820 2872 msedge.exe 86 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87 PID 2872 wrote to memory of 3648 2872 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8bf0e625dd8bf225cd550790c0869106_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15458327065032951368,5517580494524950381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD50545e651b908bd31aa2609feb697203d
SHA1b5687903f6b95a01775ca3b8db4723532521f563
SHA2560d2ff94ad01a33cab9b13ddaca415c00bb04d5277d52efe9c47fe9fc23d5172e
SHA512c3068de71dabfa8c876725d87b01f258ba5594865505af98866fe3c9ef25ea2a3a20b90c8d07659c2c5d4c5b6d682ff142562aedc0185461b3a645e09aafc890
-
Filesize
1KB
MD5202af1cd93687cf3f41ab84aa675cb1b
SHA19f6923c128d1633fa5cc281a57ea3bbf42793cbb
SHA25646294f17cea9d336648a8d5d90d46f34bef33e47d4f539d99dad3feca59f09f9
SHA5120a074d6581bf69618ffcf162d24613ed9028abee5f73ea987bf15d22653d4ba4bba4905634500a2ce6c1247b4ba3e540f346852fa6e98045dd9608a15771e98d
-
Filesize
6KB
MD5638ed96d9fe593c7f37f21f35b2836f8
SHA11f1aa7e7c93087cc2e0f97b47484d82861536dea
SHA256d307a5ab7ded518fffc93a97565477ea6a10e5e57ae5f80c4c084c6ccba3b068
SHA5126a7694a95ad279601f504612de7e2cbb7a150ee61790aa5973a685883866422a0a2a2f2b1f5e9f3ed7b42d7b85b1f6477d50e19f2a52b25c8dade23c1ab43e56
-
Filesize
6KB
MD52ed3507277b99e12992c79a9c601c5cd
SHA1f17a51ef4d9f06e024eeeb04aca87d6f5edf932b
SHA2560c12869a6844dbd363b42c23c9a5893392867fdb19392ee6281f25cc0eb1ba96
SHA512d00f952e97eb231679eb53704b826ebafd56cf9e5747eb58c5b5795128fd91afb5dd48659d8baac95a5fcef4d610aff758497919f492e3bc8752894f34db3b4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e18b32738909840c58e74e1901a24f8
SHA1baf04d3751bd2859ef271dbc102c7df7b1ec9340
SHA2569e9c37770620f65d586cc77c12faf27d921b467064cb1ba4936a1389092e7233
SHA512501d6678082537498d88b4c697798aee95ddf8a669aef59c56f3717309fb41c1e78056fbf4c14537d48155bbe0838165b4b2b4dd836960d78e409374c0881a91