Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
8e61027fc9d6d60e5b8ba38fe1921130_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e61027fc9d6d60e5b8ba38fe1921130_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e61027fc9d6d60e5b8ba38fe1921130_JaffaCakes118.html
-
Size
47KB
-
MD5
8e61027fc9d6d60e5b8ba38fe1921130
-
SHA1
f1edd7a0ee38b0352774cf5f5d2ab1eff342ddf9
-
SHA256
e05c1b526ffeaf0dc2bfe84c2bd225561bff2a6f846b48a1a4e8faa52f8116e6
-
SHA512
3651c25c32d1c4f1c0194f8b686002c85783872b48aa10f0c02aa34e0fad45c051cd438644201088a67cf5f6076441d57473e4a1cb3b08c08c6f47bb175d66b2
-
SSDEEP
768:/6eSil0kDxb3w24XFJsXIrf6YPYbXngVX62GELhIXNa13EbzlZ21j:/60LYrf6A/Xma16zlm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 1792 msedge.exe 1792 msedge.exe 4256 identity_helper.exe 4256 identity_helper.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1096 1792 msedge.exe 84 PID 1792 wrote to memory of 1096 1792 msedge.exe 84 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4796 1792 msedge.exe 85 PID 1792 wrote to memory of 4312 1792 msedge.exe 86 PID 1792 wrote to memory of 4312 1792 msedge.exe 86 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87 PID 1792 wrote to memory of 2984 1792 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e61027fc9d6d60e5b8ba38fe1921130_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14159334330100234013,7029504300558921627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
21KB
MD5c3a1bf5fbff5530f55ad9f9fa464f25c
SHA1449a621b775cbe1d3ab69c54a0e18c0ccf6d6caa
SHA2564ea6b3a39d794db93d1084770cc340272f8e5ffd5cd8d0c05c1f5841e5dc13e0
SHA51275aa617b33be2eabe9f67166d14939d58abdb2396b9911dc7ba612130d2ba9adfc90a3cc9b6de4dd6cf8731c90f2ca74b7f9cfaf4a9d0bcbf90d03c907e45a54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e4de7dbafa69e07c63a088a3a13c61f6
SHA1cabfd82bc67ed6785612b41eaee02181d2f72e26
SHA25638f04de929cc5748bf1752a2895fdc07bcd054bd5b86100756d666dc21f12bb3
SHA51291b9d8190f1b5b7612ec0e0909c4651911bc950dd0657c1f8a65225210515c9c0bcf2e059d3ba34ce08cb7a0113fee0783da762909f80b9793f26f0bae54ab1b
-
Filesize
1KB
MD51dea433d132bece352d07af097dc92be
SHA102ffe9ed5992cba5807dcc4c6e4a5bbd93d8fc0a
SHA2565a808cbbedaa6e556d53e37e49d71172f6c001d71f38808e426085f2332fbce2
SHA51275d584ca0bb5030a5c04fa06d243ab3927acb085805c7422c9629b03c9024d1c05bd85c7729944f2da2f160a8a5a910ec7bc44296c6babe197325978776d19e7
-
Filesize
6KB
MD5e2fee28d5b4f7385b925d27f6fa4cff6
SHA1c1573b7b1aadfe1d50453aab3c9b589b3c67cf72
SHA256adcb6fa5ef62f5e9651af4396de503247919b1e6f97ce334e18c32e6e485f46e
SHA51238058c165ceef3ac78cc1ed6a4e9940f3e115fa14dea4aae793902fadc2ec4c3d9f19859b6e8200767729d8045ecf2d83c7359b3b51cc2294016765451a57acc
-
Filesize
6KB
MD54ac88c552a1baca149cad479b2d94536
SHA18069ae99973f03485d1d8d379833c87c734e01b2
SHA256017c6feabaedda89b114a156e14fabe734756a5844d194afd3dc92591a8eecce
SHA512793b5820a419b43a9ba43ce0f84fe49e39cf4068b47c1984a1d2d0718c9e150826f7747ef3b338234dd4d750fa89b6aaba9fc1a405f4fa4c8faa38f027835bc9
-
Filesize
6KB
MD590014129b1851ebf2dd84dba1525a195
SHA1be10bef19c706a4730c725a5b2967008bcd7e4e6
SHA256bb7c5965cfde5e33d2baf19be5fdc46e0c1870f8de2e3e5eeca0233733869429
SHA512ba4aed61a89ed088410b65a72cd143490b9d235473bad0dd2f0c20ce3499736eafee3de1116035399f300fac66184650ea25d4753ebb204f2e9d671e5e243714
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD560845d926ffa291bf2253a8dc3ad9bc2
SHA136d15af72b9fa33644e0f7d1d9aee022c309e159
SHA25610dae042a1355dd5f607a5843ff8244bf53a9fd28eb055c3ab2fb79ef5261887
SHA5129d78189d7eea353b1f37bd46a3af1349b595ce617bee3ea13a6d6317b32fb25fb57a9b5419f4c8233b8fc298591481743a11720d0923671d36759882da5902f9