Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
a4f0439f9e5023fe4b7e4a5f748d1513_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4f0439f9e5023fe4b7e4a5f748d1513_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4f0439f9e5023fe4b7e4a5f748d1513_JaffaCakes118.html
-
Size
36KB
-
MD5
a4f0439f9e5023fe4b7e4a5f748d1513
-
SHA1
a0ef6da0e00ec7014eae830964cb98379e9d52c9
-
SHA256
56dad24c2e62048470866454b8d4407f8f64537e27dcbd732bcd6999eb9db4d4
-
SHA512
c95071d9ab377d784f32570c12e6df768010e044533325f8b90228e62183b90a14c324bd7e402eff4d61c9d9957df01c460c129b932fd8f5772488bc37731356
-
SSDEEP
768:gIBIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZJ:gSIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 832 msedge.exe 832 msedge.exe 4784 msedge.exe 4784 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 3112 identity_helper.exe 3112 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3952 4784 msedge.exe 86 PID 4784 wrote to memory of 3952 4784 msedge.exe 86 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 1048 4784 msedge.exe 87 PID 4784 wrote to memory of 832 4784 msedge.exe 88 PID 4784 wrote to memory of 832 4784 msedge.exe 88 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89 PID 4784 wrote to memory of 224 4784 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4f0439f9e5023fe4b7e4a5f748d1513_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b2d46f8,0x7ff82b2d4708,0x7ff82b2d47182⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2160 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,5920826844152765113,11278461087944461947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD587a44e53e2ff13528215ded989399465
SHA12afc4cb3307774f5ef7c21aa290067cbe0541e76
SHA256a1e20d80d6f1868a08a3a93dd5f86095a7b578dc7803a7b9d7021522071c424d
SHA51223d513d77895a0534256371395b90a94f3334115d9478965f3beec041fd41f273a7156962f93c5ec9d8334384e6ee09e2d103fcf32d246426d0a47c2e7309f4d
-
Filesize
2KB
MD58b172e7cf55ecd075106e9df61d00305
SHA154e64ceecf577f717fc82422dc546da60d14e447
SHA256347f6137dfcc69d4b38f49c5bfbc7c48d7a414d514ca66dff140b1c80d1eec98
SHA5124bf326b54ec089afc5f9afb0284b9cd2c7c68aeb2b64bbc78c19a886bfc29786eabff3631bda21674d52c9b654f2c37e832f004e9ff2b7c5ede02385a614c1b7
-
Filesize
5KB
MD5f5d336aec60661ba07ad26ac27d15aff
SHA1a36e2937c8bf53c77e3be84041b96747e289b4b3
SHA25694687765f8896b72885813e8460de76af28afe6022c7a18caeef01b41cddc2c8
SHA5125eefe21d65737d538d3e22a0a77e6b21e1caa4e4e98174a7abfe5412cda8560a4fd58553800836938195d6f1b281ba7d050543f5f056faad550dfb435206fae3
-
Filesize
6KB
MD5342e289abdb62e35bb00fb99611f2e72
SHA1bef83d52626855f095e3b742fad39131baa5bb16
SHA256fc0f4968f6f12067b367818bacb6f48e4cda23ba2df714835d1c4b9cbf63ee25
SHA512057549a0c6abf5a48ea16cb27667f9c5b9d89a9772e12d0044f552630561e4df57e95c925e3c90d49277175b9b392032a3b80cdb3e034d892fa1e399b32adbc2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ded5330da64aae673dd08c1e8e596fb5
SHA1fd058559285ac7cda0de2a47080e27b4f6130994
SHA2567c49dc7d4abe11528f205271d4b82dba1df80f58ebd277917fecd5cbb1700c68
SHA512c4fd250d416d6b0ead21fba877f5d6f29ee20a4e511e4d3ddbc40424c684415198f2455974d56c4f066de37665154a42ae25d0d0b9b7db259694f884a4ec1978