Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
c20aefc67871cf0084d86fdb8ca92112_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c20aefc67871cf0084d86fdb8ca92112_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c20aefc67871cf0084d86fdb8ca92112_JaffaCakes118.html
-
Size
15KB
-
MD5
c20aefc67871cf0084d86fdb8ca92112
-
SHA1
3ef15305fb95c02b33a3648ca37fd1cd1cfba84d
-
SHA256
8c326c0b47b12701948999ac84253e50d671cba726ddd7ce5398da5e1ebabaaa
-
SHA512
79bf9d0725de3fcf1691dc7475dbccad21bd8ef04afc78660b08d37efac817c3933827a4db5e87d23069ec88c145b3e651c8dda2ec03610e4c4088601dfc4243
-
SSDEEP
384:kQwiu7Ob6/KrqlmskqYtFYMEMOa89DWQoUc8uAxsG8aZCuIf2V2OM7ZIak6hwI6m:XwihmSWlm6ue2ySAxsG8aZ22Vf6KRjf2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 772 msedge.exe 772 msedge.exe 3992 msedge.exe 3992 msedge.exe 2568 identity_helper.exe 2568 identity_helper.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4992 3992 msedge.exe 84 PID 3992 wrote to memory of 4992 3992 msedge.exe 84 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 2396 3992 msedge.exe 85 PID 3992 wrote to memory of 772 3992 msedge.exe 86 PID 3992 wrote to memory of 772 3992 msedge.exe 86 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87 PID 3992 wrote to memory of 3520 3992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c20aefc67871cf0084d86fdb8ca92112_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14789583524218038927,7172970528428600221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5cb5752156813377bb8ebdddde130b35c
SHA1b8e3f343d81cf49a05d475a5c3895f1d68f55cef
SHA25612ec7be33070fe6dc85d3f4b94f7e8761233b7b9701fcc3d86d6afc7042dbe4a
SHA5122541131dccd0b52709df54c61d51dc5895f4e14d0259d67dc288e3efe070cb32740b1f0fd2b3a3f3cb6f80c36c837be49e1ce0686de24b55d207e55bfa583e6f
-
Filesize
1KB
MD509d8dfcc02f3abd6510e85f19970078b
SHA1aab0ef1848801257a00fe9d56596bff09512d113
SHA256ee2348e559241b6e311243bd886b2440564697f34a0112a666aa9b633ad9a3a3
SHA51277589969e1a3876534b3f1d34702249ba8c26019a05dcab01a8315afa57cde41441a10f80420bec054ad06f314896c0bfccf31f958bc0416c675547359962d38
-
Filesize
5KB
MD596569dbf14e22dd372bc5590afff3b60
SHA16daefe6ec148ba10b006aecdce7fe591062c16a5
SHA256111361e254a345a988c0e486ee661deb0c88812e55959874f7285cac74b222b8
SHA512c9b6fd8011ff78943b404bee5b0996a2a10429e358fb76d8845a81f1da90aeb6ba81a7ff894ab4607e11398754d98f0bfac9d944d4f28738a1eec2efcbe5836d
-
Filesize
6KB
MD56da1a65ee7d892179be2a26020abb6e5
SHA1c509ab43b5695a4f0e357ede8fa90cdbaa12fbb1
SHA2565427e06b94ec1e8f1806c87a5bdc10cb07194c469037082bf72ce9c20af20306
SHA512fd484233e132be8c0edcd29741ea1b0a60ab9fed1d3088f2b65fcdf5b8ebe202fcbeaee01fd76c9598d8fe16822c9a677577cb341085223b293ad4a09bc5cd86
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5689e32d36e198f92cf7ef75cf570f6c6
SHA1ebdabe51395716399bbd21818cdda6f9625e9316
SHA256407aa928e8aa42aca711add2d932e9ab9321aee421e675cb998f36539d2a773e
SHA512e33e7201cd27856f4c319569e7b5f9dab82cbbcedd452791afc67c1eeb4b4480296039bccacb92d1f688465fca6a195b022f2a1aa5abe8aa16c6e6d5cdf6269d