Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
c7953a2139aa80d2d400dae07e3fbdbe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7953a2139aa80d2d400dae07e3fbdbe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7953a2139aa80d2d400dae07e3fbdbe_JaffaCakes118.html
-
Size
65KB
-
MD5
c7953a2139aa80d2d400dae07e3fbdbe
-
SHA1
bdf3d82db4d2aa60077453b91a6c667e88b68047
-
SHA256
b47357a57c6462ad305a4fdabcbf520ca85911b1927de9cf84a56604b632d712
-
SHA512
e0984446347695226145711af9fa975fa9c2c5c0f96971da0c944b1f9bcabebea266a541c2fc9d8b25c45372ac241909e5886eae9d6beac16de6f4ad70b400b2
-
SSDEEP
768:JiEgcM0St8tN99OIsapWrIqLoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/Ijh:Je+E/ETIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 1556 msedge.exe 1556 msedge.exe 1708 identity_helper.exe 1708 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4632 1556 msedge.exe 86 PID 1556 wrote to memory of 4632 1556 msedge.exe 86 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 3588 1556 msedge.exe 89 PID 1556 wrote to memory of 4816 1556 msedge.exe 90 PID 1556 wrote to memory of 4816 1556 msedge.exe 90 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91 PID 1556 wrote to memory of 3772 1556 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7953a2139aa80d2d400dae07e3fbdbe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaae9546f8,0x7ffaae954708,0x7ffaae9547182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15331306858802689500,16923853451287713070,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD59d15240e839173a5cbdb7d9d9e19e21f
SHA1e6c05bf5e67946f14c94c228b30996de340874c0
SHA2568ab60358bf7da216b572a9ebca50ba8961165148e5a0094261384b49670c050f
SHA51244a25392252eff2c6e77b77dc0d57a75755a552e559ec4cb3fadf1b69838ef5731fc60df79156f6afd0857e7854482f0a0e509b9337f5f287b0bdf41d984172f
-
Filesize
1KB
MD5fe961766beba0f8b7ddf240b3c703b86
SHA1e3a368ba067455b18039a702569ee48733984245
SHA256835ce0b325961f07f59ef88778a3fd6c9d8835b4d6cd6a8d53629e77c6696143
SHA5123d258f908fac6eae52809436e2a7ac92e8984d708883e3e711ce1190df34593575ba9f06742414edf2ed519ede23100e3cb1b2bd167fdfdcf96ed0e083cde864
-
Filesize
6KB
MD594502a95f105db16c7afc2b3c59f9834
SHA1e9ea6386ac2dcc572b5156edfb4a7ce1bcbfdfcb
SHA2564aca0fa5b1f117faba98457cd9674010cdef15d5d2d5a6ce3e371faf34760ebd
SHA512af1c0321f2fa2e1e6fbe7d40104db7410ad5b066001c5194c30ac71803a3f5f0736b2def38ab5b649d0f174bf151b2b9b7ba70cffd0161e67be70c6980b461ad
-
Filesize
6KB
MD5949ac808b17faaee6fa2da1895777d1f
SHA1fd156fd047698900722edf501e9054ef9a06a4c6
SHA25689f128a9f201584f5a023879798b8365fc3e2c5aab6582f1a5b4a49caf3c487e
SHA5122efd7f748ea8c811c54e2b59afcdf1304a14da9e258144c256a3552ea907b54a6a456384e418dfa798e9a48002c172abb7d40747f2c6cbb21b8fc750479bd5f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51f187f47ab3c6502e168dd1312118a62
SHA142119d4e773ff4be577b0ee7b00317a54a6f77db
SHA256f5f8d055ac48e431427b39de464268c54e1a044bff44a33ffa05bc758b4c2ffc
SHA5123de5a3ddad22e836619789bc83612ad3d289e40a3f65564871d8157ff7c92fa8a6120648f85f4071e685a580d32073d85934308cef65d122def36cd94d72f1f1