Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
b84b8b2549d0e33057f4f793ed393fc8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b84b8b2549d0e33057f4f793ed393fc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b84b8b2549d0e33057f4f793ed393fc8_JaffaCakes118.html
-
Size
8KB
-
MD5
b84b8b2549d0e33057f4f793ed393fc8
-
SHA1
abc76cd44b114b3425ebc3457dd93dd5da6911cc
-
SHA256
b9b22918a389fbf5103b005b6d7d8f4d489f3f543131d48998a6a1467be27e0f
-
SHA512
468416bd6a545f6fadb42837ba288c929e8b6b77414981b05b11d52d3b0fdd0174803a852d72219674f776f4c4d08bc2238e259dec79b10ef2c7db5b444700d6
-
SSDEEP
192:6psaVBRdKa2kVNvG6KpWs9lPv9NfVK4Xb5s5HOf:OsaVBRdKNk/vIWs97K4Xp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 2596 msedge.exe 2596 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4796 2596 msedge.exe 86 PID 2596 wrote to memory of 4796 2596 msedge.exe 86 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 1764 2596 msedge.exe 87 PID 2596 wrote to memory of 3572 2596 msedge.exe 88 PID 2596 wrote to memory of 3572 2596 msedge.exe 88 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89 PID 2596 wrote to memory of 2472 2596 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b84b8b2549d0e33057f4f793ed393fc8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e8b446f8,0x7ff9e8b44708,0x7ff9e8b447182⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1712,7522238380665589837,15360973074982847632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
35KB
MD55aa94d792a5d736251dab3d4127d9f5a
SHA195ee7e29c47ed0e0dbf5d305ffa873182454508b
SHA25628d46015943f6fa73bd1c7ce3e6097a67b9239bf104270572ce3da4732158797
SHA5125b0dde13220e862988572d295a6d32b57e7d094568e7cfb23f9826c6f5fa1f6c57c91ce92bbec8915d2d6b9fa4b7a1be8d11e98b93a90b85e624603e7cd4687c
-
Filesize
40KB
MD5ebcae15ee0a7b72d1c58ad9c9ab1d369
SHA1d3ee3b8326eb4729ba9fdc497270bfaaed8ebfc8
SHA2569d38ec9a9bb3e0be92611e319269f7da581b98cf2ea023fc1ca4456ac09e07e4
SHA512ebe040f9214919c6c7a707efb6457c6e2ac2891010f4bbd3227ffdefc85841015c2ce6a6ee6b5d29ffedbeecf1c742220a42d405905d6938dac451bd7f0d3122
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5444cfe8cfa0be925ad2a597a31b4f1d5
SHA19328d5f1257d145be4cea6a5af7fb2a3119b41f8
SHA2560fefad9f9e44de5274dd3c0439ac041ef0e04ad3643127af3ed1902c746656d4
SHA512f1e213286dbc938d3233e5ad09a734e1643a9f0d2529412f758add085830f50c41c6cdebeaf368c6e6df568851de0b15561f6fa218b386b2e1c6bb418a181574
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD51da8ba73236b3a84692a1f8782d73866
SHA1d56ab9a3c69edccd528f2eea78e45b7676b2505f
SHA256105a3300fcc81ac5d5d35bd8fc16e5118318c2d1a24fc6e462ab6ee921e2ce91
SHA512eb82d5838b8e8c553ae817504d80583b00b99e5480afa042f79c89a889be2513b22905b4a2972f0b7b98811be44fe2703c367455189570aa87b257454a5c6d0b
-
Filesize
6KB
MD5dd3e2b5dfdd1a81f9658178442027b01
SHA1d2d181b06cc1713e36a84ea4a221d7de66049225
SHA256d69c9e849101962333e31ec6c23af5a2b7d5cb0a5d7717a86ec49589300f3942
SHA5120a82480c039e95893ba3127f42c69ae66aa3587154688d9f276ee0d8eefe05ebafd55a1437764782dd491c5b535eb4defd331f2822821db8085de5a07ebef10d
-
Filesize
6KB
MD561c703e274f082ad510f88b1930bc235
SHA17f23aa930680bc236c504b8e8c59ec896a2ba9da
SHA256b318046f38b9051b4c181abde294c3902bf4e05c7c6df150e324ed4cde06237c
SHA512dd9efd4e4eb1da458298363b2bb96917aed2e1e65b607104cbf166f9f61a1d3cc92bbd34457ed008389743c859f43b81be98fbbc6d02a4ffcbdd00744612f22f
-
Filesize
10KB
MD583fa0394e70430a5bd5c643e4669af11
SHA1f9350d001cf39e65b006843868181098257df01d
SHA256f6e0691afe49b84958b66ae5d5059d564ed01defabcd06906399b1bf9ca54b9e
SHA512564bb39e61ecc95298188d476994ef59fbb00185677893f2e1c381fa2a689f307485fe9499405b9c1e08acdf78334917c9b21f8ceac8b5d5161b7e4e6f1054c8