Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
-
Size
32KB
-
MD5
8d24556fe434a8c276a9c6f1859d468c
-
SHA1
e632aaa263f6f7ff3bdf0fccbff3946cd844f43b
-
SHA256
ca706cfc01d71cce2a81f27c3540d0abd7c4b336d2980516588032fbcc00bbe2
-
SHA512
c65df1c69a0f216eb2650a06f52caa13e78473d535bfdff5f1185b819322c46a1725ba85ff9521a02907b3d1ee23c4449e45e8f7f4309dd5a539174897d1b6a4
-
SSDEEP
768:Zcd9QZBC7mOdMUjpC5I9nC41VGJw3wkwfgkIPd:gQZBCCOdL0IxCKVmw3wkwIkIPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 884 msedge.exe 884 msedge.exe 1924 identity_helper.exe 1924 identity_helper.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 3364 884 msedge.exe 84 PID 884 wrote to memory of 3364 884 msedge.exe 84 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 3644 884 msedge.exe 86 PID 884 wrote to memory of 1896 884 msedge.exe 87 PID 884 wrote to memory of 1896 884 msedge.exe 87 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88 PID 884 wrote to memory of 1852 884 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc07546f8,0x7ffcc0754708,0x7ffcc07547182⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9592107184039415116,15153680211627824428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD56003573ddccf3fe347cf4e6112b501d3
SHA169a6502b35207b9e433a280d79d0f3268c357960
SHA2568a7fb297a69ce805aabbce70ae1aff02be837251ed7970770e8b5db22c8d75ad
SHA512a9b5c4647ddfa85b08d518d35c2f46f98415a3d4b463096a347f179ffdac24da77f7242e7b51624da42e52b2d86ce2c13ab532c2a0c3028e27a2b153b31d457b
-
Filesize
1KB
MD59109fc786e14c74d0d7a68f0e6b24969
SHA130745aee05a74d7b71ac517caf581e2789120bb6
SHA25679f67ba5b836a126a6438d13fc7c7dd365f37f55651533ba3fb74ce8a43e75fa
SHA512e5c5041b366fc9ab255e48a8c76eea0d8362252e36e4791920949f76e2638a7cfda8684e5b43c8b2eb5f5cc9a192b95fc4dee5dc948f4352e8d6c3876d8a0e18
-
Filesize
6KB
MD53ccee977af458a4368007276690bc5ff
SHA155cdde315b8fc2527aa47d09ccc91350593c3d85
SHA2567363238665639145f211395df9bfcbc3658474b15bd5caf49351be6199d5cc40
SHA512f1e4a0cdee11d46554b9126898fb68b742713f036e9479b38a2f5c81e5e9206d980cb2d6ad47e777190ddd0f40e26593e678c473ba188744cb736cfa810950a5
-
Filesize
6KB
MD507f89bf1345b485603bcc7d766a58e67
SHA10a7412ff60a2e1cfc8544270c7ae552aa1925c01
SHA256e76c5db1bd200ac1394e15101dd6a2c3c60677ad43261ad40990c5ed41e19435
SHA512d24a0c0c6f59a38047c0ee6f69baa7ef4a823efc55840cd679d752faa34952e5f0809dbbd75547b7dbc2a8d27b79f68825ebb43ee96d9c52411b8b43dff9bd2e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582e783e9f30de63dfa24b1573f0d32d6
SHA1a10271549d8eee5adb1a1543c27ce697b29afe8c
SHA256729d80ee4f72b8417b05a8d22a42ec006a258bfdb68a78d7bef463caa9d96f19
SHA512e455a4d626881e6e3dc8bf992225c2071ab7386235d00143fa921eecf77ffbcfea370253ae5d285333baf357b1ef34f976ebc0e5705c03b7e264f95f404094b1