Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
-
Size
59KB
-
MD5
943e50cffd1548c7f27852a22cb3547a
-
SHA1
6fafcc91874a58f87e20e3fdf1b8a9393a571c38
-
SHA256
170e438ea4abba055b9e183ab5aa221e634f00dee4b5ebfc2b62a508241bfd14
-
SHA512
8e98f79e67825684ee3163a848b7d9a02c09c221e6432e11f9232dd54f0b1669ac8107e3eb21a1f34ee26f338e7d8ba54b4532f9976395b3714d02038c531d7f
-
SSDEEP
1536:gQZBCCOdi0IxCi7tBfEf3fhf9fOfFfPfAfUfSf6fpfXf2fzfifmfXfvf0fSftfGr:gk2w0Ixn8vJlGtHocqyBvOrK+PnMaler
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 4476 msedge.exe 4476 msedge.exe 2716 identity_helper.exe 2716 identity_helper.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 1884 4476 msedge.exe 85 PID 4476 wrote to memory of 1884 4476 msedge.exe 85 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3732 4476 msedge.exe 86 PID 4476 wrote to memory of 3724 4476 msedge.exe 87 PID 4476 wrote to memory of 3724 4476 msedge.exe 87 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88 PID 4476 wrote to memory of 1696 4476 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83fde46f8,0x7ff83fde4708,0x7ff83fde47182⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,195840667942283989,5562263136118677584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD568c7517e295fe97d7ea61f3498c1e945
SHA125f4152e0858c3a43d4abeb418507bb62630089b
SHA25622f7ca9e847e4ecbc1faa463288fb683b2bf98bd532c62faca095f469eb1f16d
SHA5127dda95714185a9e652a5dbd3d66093ce162ede3142cdd03bfb53186c5b475425baa13c9f8f78b62c7d5929067884c23d23999c516a79871a79f97225aa0329e7
-
Filesize
1KB
MD5bdbb14bc0c495614474de281a0f6a4f7
SHA1421bfc524c680a9c37b78d7ef25b25bd3ef9579b
SHA2560796f7652f2bb394a6461ca41a6da1d3de86506c34e746d1460af8fec72673fb
SHA512fbdd9f6f1f20b25c0a59945d9790373379bc570e70086d69eda9b85332077ccdf8fb36a846341d217a91918fd5828bcd0b3ba91132d68e4897ab886ca8eccb9b
-
Filesize
6KB
MD55631d48940ad7797338f7ae14c051e9a
SHA1f9c04c25d7ef0784a46b92b582358396105e8f45
SHA2566ad45ed37f1de1be0aceec561f9d496f52e7ba10524661c43f2af179b17fc894
SHA5122e71d220646698be55400586cf9af8b34d5fbcc96d8f4d7bc1a6f43bb9f47416fa969a7ff1f78c01bbc7159dc2f2da88354f1f7c8191b796e89b7b6e35aed042
-
Filesize
6KB
MD57166d079df1e121f009148068b409af2
SHA1ec1ca340891dc75698bfd874fcc3294ea8e726f0
SHA2567d142fff41c97042daa0108781549ece4453ac2d70aa3b993c15c375e66be3ed
SHA512e011beadb4c243f6c6f0776a472c00a6e05dbfa8c0cb68dbd22ddf279aa1b50402e174eb313975014fd89decb9016e251ac6ef59f2a345b57a6fdd12ff3c7131
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56800ce79fd40356ce60903ad57ca9fd1
SHA1e7912460f280172a24b35312977d5f7593cf695e
SHA25601cd0c9b0ac0249f2c30be07e63939d6a5ceca49c5e51668fafa79a9fe03216e
SHA51256aac0189f428bffaba16179255c7af3acb8a840b7d68b1b63d6476b090d180e2b80e26095ebe2175fdbb47e24095e8a9a178d07ad20c87a7cb8d67716f28742