Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
d12c3101e6c97cca221ab6d93ec9b84f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d12c3101e6c97cca221ab6d93ec9b84f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d12c3101e6c97cca221ab6d93ec9b84f_JaffaCakes118.html
-
Size
205KB
-
MD5
d12c3101e6c97cca221ab6d93ec9b84f
-
SHA1
b840b08e0d5f2c1a9ddbd415bf6efba31740382a
-
SHA256
9ba55f34bbfc8f775e55dd74244a24da63be04aebd79aba8bbb3eb9623cf513b
-
SHA512
d43ca39785897e596aac0eb00c9cd1d7ac3e4e6b3a35d2c24b9ce82e7cf52248f52bfc832e2a0fe9cc7506cf47ed2dfe41e3d72dcf69411952b2c64702cb2a14
-
SSDEEP
1536:fpvTmori0LCVx4vVfjz//GyeS7pP5nVRVve/eaezeQeg1OPem4eideile9Kezfe6:frUEvNz//GyempP5fjxa6uGUr1lhY+bR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 3648 msedge.exe 3648 msedge.exe 804 identity_helper.exe 804 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4688 3648 msedge.exe 84 PID 3648 wrote to memory of 4688 3648 msedge.exe 84 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 1820 3648 msedge.exe 85 PID 3648 wrote to memory of 3368 3648 msedge.exe 86 PID 3648 wrote to memory of 3368 3648 msedge.exe 86 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87 PID 3648 wrote to memory of 4888 3648 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d12c3101e6c97cca221ab6d93ec9b84f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67b646f8,0x7ffa67b64708,0x7ffa67b647182⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2436 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,651718392744279820,9768123461967150633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD582496229db02e0d767b07d8753f55c85
SHA19d753385888e23247faf958ce1a0b35969e44df5
SHA256169a12b81ecfd51658bf01e72cdb7d7f625eb748cf66d0901747f32f69926b21
SHA512e7ffa89b18c8fd3975103c259c4563176dade29de59b1149c2d35157105a7ed4fddf09b5d0d683d3b84cceddf307c3ac8f61f542ee6e1bbc6d870d64d926f382
-
Filesize
1KB
MD58d2008e01f021250c522cf5f1cef7725
SHA1a0e02b0a1db85ca32c6521edd5e4f23469f73224
SHA256798c7222864258063e15522fcc16e49ac305b32d1485761e5fae82cc970e00e4
SHA512626febe79111679ea75f7b62630f60e2b9cf8871f3fe3b7bfb016aeb9e8647a671084eb0b009433b147e7298751de2b2ea4a1365b5492fa220a76341e4bbebdb
-
Filesize
5KB
MD5f89758a25f427f078e55b3bd71259775
SHA16b89b3caead26f0468824cc7a7834ce3dea0cb3f
SHA256e1574351d35684acc2caf0bc6da05eab99c7732be80335c9ea3c58b025754430
SHA512852929de9075b683980fa9409c367380a688af55556b539735e223808c9c8f2ae1edfb46994536acef59d62171775e2c363e25a0f0876cb4ecd070c76a26a96a
-
Filesize
6KB
MD5e5dbb9d9a98968adcd5736d3370a67e0
SHA12aa4569a073b29f945261d67771cd494ce6001fb
SHA256bb2205f3cf0f142a1f213e6d01d1dde8e8967c088c9a6ed74b261eb74e172948
SHA5122e86f55c3f1dce1568b17734cc7e07ad3d02519a0805d058a19b5ebb8e8c908cc76453605a76a921d3e8a26c1bb0edcf1ed5c90160c2ab5465afe09da2124fd0
-
Filesize
6KB
MD5786edf5ebf0f58c11b70a330e0c59cd8
SHA1d627cbb55b8949b0d2fed53dfc5a201f56bcc0d5
SHA256f8ee3065c28af419414b565cada475528966f11c6b7d180e0f25cd9ad12772c8
SHA512d5c0bd1cc336275770bf5ec0cc33c5bc498ab02be320f6a590d0146e0b1e9e688a50d0a0d3ded1c28617e7fa86a4be44b54cc8b0e1f2d779e2cd283b7d5b8b89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d91044844056666af280236f0f939dac
SHA10a7553ce1772e7ba210dab5354445a3f02446509
SHA2565504739a98224aff0aa227ec0304a585051a7195bfbf508ea079e5c68c1cd5eb
SHA512a8e7e1449cba94c72ec93965b2828a610d238279e46cd146a37ba0952e718fe046babf1f365ec0e6e7b0b91b6c54570a9ed79b4552c375b0f4d581381c0489d8