Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
-
Size
90KB
-
MD5
93b266a094660b4ed7ad59129f6ada94
-
SHA1
6e89888882cfe4e7b7916160dd90a75e8c25d275
-
SHA256
47c4146dba91d4c79db4c5aaa128cd8fea2d981b2bf2eb2d8b40748f218a58ff
-
SHA512
39aca25d0b5b869236e3be3ea6b8297a4a0a8cf948bdac7347b77eab4fab7469156e776fb143868b129afeb2ca833a531a0e2491e39715b5b9355277fa28b3d6
-
SSDEEP
1536:gQZBCCOdb0IxCYueDXBUO+wEC6wn0zkVngUF6tpZMvHY7PwvAfUBzRwJw8XtKzM4:gk2N0IxD9Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 684 msedge.exe 684 msedge.exe 436 msedge.exe 436 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 5056 436 msedge.exe 83 PID 436 wrote to memory of 5056 436 msedge.exe 83 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 3748 436 msedge.exe 84 PID 436 wrote to memory of 684 436 msedge.exe 85 PID 436 wrote to memory of 684 436 msedge.exe 85 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86 PID 436 wrote to memory of 1104 436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe024c46f8,0x7ffe024c4708,0x7ffe024c47182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3159650636438072950,4418088994085191669,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD54eed86e108b1f249377ca9625abf42fe
SHA192489262bce83c47f0cdeb1cbc3657c234102051
SHA256b6ed3a9e0e39b132a71fbc1528545cf16871f46c86fd3ed9e93cb28204cfc9d3
SHA512b52eec960db1d07f557aa162cfb002f15d8a61d7dbb680c1864e7193b1b90be36cb82d4baaa0cc3d37e563ba05524fb369559501e411dd2f56f029af6e20e850
-
Filesize
1KB
MD5d76cc188888d876ee8adc40e251d70fc
SHA1c590846a9b806bf12d5de83448f118c66b98d48e
SHA25695b848936c0f2111304d72f4e688d2b9d4d6b3435fb41b1e014eeb703dbf6cdf
SHA51258d5c90b7363bb798aac297282b7a1c3fcd9ad1949c841ad22e41ecaf806121a642cccc30e0fba4c2ccabefff4b9fcd1601b171dbec1feabe2f626d7f3b7804c
-
Filesize
6KB
MD508beaf5e619b923002a9df47b09ac787
SHA11625a5bea77f0a71428b1515636a5e4e3b7f7a44
SHA2560283c91977fa7bfa617c2fd5c2eaede4e17acdf62166c925990beeb5b37ba2c9
SHA512c04c860de66149cdd466cbf81222125ca081c570500208584ab5475d6db6ab648e60b26e66845dc6ac8e407d72f25547b6220d09b6d8efed472bf4bb14e9824b
-
Filesize
6KB
MD5ee5ac103949e0ebe58d89092ee2da0f4
SHA1c82b7c99c3fcbbb1843afff42debc7ac44f50aa1
SHA256446f977b1a6a53de92f5c7a38492639ca15982cbb1b346714bca18a4e2609d94
SHA51283ad8ebaebfec478a3a94a6d6f8218634212fed10bbe1090c626995c3d88f812346a01220a03fd72130d548c012a91476bfa2e9ce99a9678fb1d605aaa958c21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f914531372a78d3bb063e016cddfb9c7
SHA11dad023e9623ca47b190233e4ee0cb22fc9066ad
SHA2566e9d3ce9dffff68562610ba9cdd9ba50cd34653c9cb08593efe9cfbdad2b0a1c
SHA512e58129135de2679503b9d3a7d25c9e2b31457ec4b98893147664523e0e7bb22f36af1f28ed0d889630a190089b5bbb51fa7edcf99b2128407dce402beeb05eae