Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
a0f993c2ea23e1dfddb94864c8a2b0c9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a0f993c2ea23e1dfddb94864c8a2b0c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0f993c2ea23e1dfddb94864c8a2b0c9_JaffaCakes118.html
-
Size
57KB
-
MD5
a0f993c2ea23e1dfddb94864c8a2b0c9
-
SHA1
2e25d2dd76571c4cbaf55370dd260d3cc19cf9d6
-
SHA256
979db1f2638cef786eb6749f2c726b8fb04b509c8dfc12316a60ebd9af090e24
-
SHA512
0c3e7a0579208129e66abd09ca95853cf12b61891902a630743a7eb6f5648abfe4aa5f4e42d1409c8677298ac031c216f93977d5c94a8d9462b1d97b2819245b
-
SSDEEP
1536:gQZBCCOd10IxC8BnXfpfAfFfbf4f0fxOfDfVf/fLfdfgfFf7fdfKfvfdfgfofmfT:gk2r0IxfB49jgsULdnT1odDFSnFIg+uC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 2424 msedge.exe 2424 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1048 2424 msedge.exe 84 PID 2424 wrote to memory of 1048 2424 msedge.exe 84 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4008 2424 msedge.exe 85 PID 2424 wrote to memory of 4292 2424 msedge.exe 86 PID 2424 wrote to memory of 4292 2424 msedge.exe 86 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87 PID 2424 wrote to memory of 1360 2424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0f993c2ea23e1dfddb94864c8a2b0c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce0eb46f8,0x7ffce0eb4708,0x7ffce0eb47182⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,12383201758143094433,8603699532618105266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD50b4cef0eb0d3af86f89b35f162d594c4
SHA16d211bcaa315be908ab052264a28d5b478aaab29
SHA2561bf1ac01f823e7b490bdb968208e3cec9bfdf6a9b858d3b2ec963f56e164dea0
SHA512d7c4b6c86ec07c951e4b38019e7b9daee467a3687712b6a2f01f3c5c4a0662961b55f7909c14365213c2f030f7a4c628c5b17c70e3a645d70127b57f899185ac
-
Filesize
1KB
MD5e4cd89ca4854f995e9463460b6f9ce9f
SHA184bd7dc9cde4f93c2a75b0182512ac4361a15acd
SHA2568c1aef5b44fe90155612f44346059a820b95df31c48b8aaa7459058820c6fac6
SHA512a582c1b94b6bd65e1ef3de26f81f3d2abb11aae8c9f0ce97893475dd43795bd25f5fa082dd0e8ae6ee4914480e708e1f67260f9e56c4600d2643eeb6861db041
-
Filesize
5KB
MD5db77e6f1a4e89932c3162fb0d04dab51
SHA12b6616d82c1a8490d750475ef4cb987f70178314
SHA25604ce001f7d6264bdb0acef181c25a42c01c81633a6b587b394a9307ccc2aa612
SHA512b4dd5b3cb35c552587799e3ba9dd57af17f55df953e6e275d6c70c9b0bab6cc41cf033659d1a943520816123ec6336ddaa64e0e09546b89f38e1250d3f52804b
-
Filesize
6KB
MD513460413d3afe8c3ff6f4e55df5b8689
SHA1744d5658999fd3e665866d5d26e87b743cbfa622
SHA256e550141af75b115687dc44682725c507ad6404b01b926c21e95ab2eac27b88e3
SHA5123d1c57c86c011f01b6181c1aa50336a61a89317017612c1d5eedce1723d78ef543b80cd7cbba0eba19520efb6bf559d720bb9f1fb10957ad15b6d3a5377ccd1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fc076ea3fde40fa637437715a921207b
SHA1a42286fc6a5399dbf9bd819b3364b161606f7e87
SHA256aa2d24823901433d77b2b5cbda265fcc0675a02e4ff04739e08f25876c1a0a69
SHA512e923909249411e3fe49521a099f3a44a7306eaadcf02819a48dd70b14edf0658fa64db63fc4938aa0f3166f4e70ddeb1ccde97c84b159a904f594ba3ec26d5cd